76.
Which choice best describes a zombie?
- A.Malware that logs keystrokes
- B.A member of a botnet
- C.A tool used to achieve privilege escalation
- D.A type of root kit
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A member of a botnet is referred to as a bot or a zombie computer. |
77.
Which answer best describes an advanced persistent threat?
- A.Advanced malware attack by a persistent hacker
- B.A malware attack by a nation state
- C.An advanced threat the continuously causes havoc
- D.Malware that persistently moves from one place to another
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
An APT is malware usually put in place by a nation state. |
78.
Which choice is the most accurate description of a retrovirus?
- A.A virus designed several years ago
- B.A virus that attacks anti-malware software
- C.A virus that uses tried-and-true older techniques to achieve a purpose
- D.A mobile virus that attacks older phones
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A retrovirus attacks anti-malware software and sometimes disables a signature library or simply turns off the detection mechanism. |
79.
Which choice is an attack on a senior executive?
- A.Phishing attack
- B.Whaling attack
- C.Watercooler attack
- D.Golf course attack
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A whaling attack targets a senior executive to get them to click a link in an email in order to infect their computer. |
80.
Which of the following is most often used as a term to describe an attack that makes use of
a previously unknown vulnerability?
- A.Discovery attack
- B.First use attack
- C.Premier attack
- D.Zero-day attack
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A zero-day attack refers to a type of attack in which the attacker uses a previously unknown attack technique or exploits a previously unknown vulnerability. |