Home
You may like this!
76.
Which choice best describes a zombie?
  • A.
    Malware that logs keystrokes
  • B.
    A member of a botnet
  • C.
    A tool used to achieve privilege escalation
  • D.
    A type of root kit
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A member of a botnet is referred to as a bot or a zombie computer.
Report
Name Email  
77.
Which answer best describes an advanced persistent threat?
  • A.
    Advanced malware attack by a persistent hacker
  • B.
    A malware attack by a nation state
  • C.
    An advanced threat the continuously causes havoc
  • D.
    Malware that persistently moves from one place to another
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
An APT is malware usually put in place by a nation state.
Report
Name Email  
78.
Which choice is the most accurate description of a retrovirus?
  • A.
    A virus designed several years ago
  • B.
    A virus that attacks anti-malware software
  • C.
    A virus that uses tried-and-true older techniques to achieve a purpose
  • D.
    A mobile virus that attacks older phones
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A retrovirus attacks anti-malware software and sometimes disables a signature library or simply turns off the detection mechanism.
Report
Name Email  
79.
Which choice is an attack on a senior executive?
  • A.
    Phishing attack
  • B.
    Whaling attack
  • C.
    Watercooler attack
  • D.
    Golf course attack
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A whaling attack targets a senior executive to get them to click a link in an email in order to infect their computer.
Report
Name Email  
80.
Which of the following is most often used as a term to describe an attack that makes use of a previously unknown vulnerability?
  • A.
    Discovery attack
  • B.
    First use attack
  • C.
    Premier attack
  • D.
    Zero-day attack
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
A zero-day attack refers to a type of attack in which the attacker uses a previously unknown attack technique or exploits a previously unknown vulnerability.
Report
Name Email