1. Gurvinder has been asked to assist a company that recently fired on of their developers. After the dveloper was terminated, the critical application that they had writen for the organization stopped working and now displays a message reading "You shouldn't have fired me!" If the developer's access was terminated and the organization does not believe that they would had access to any system or code after they left the organization, what type of malware should Gurvinder look for ? A. A RAT B. A PUP C. A logic bomb D. A keylogger
C
2. Naomi believes that an attacker has compromised a Windows workstation using a fileless malware package. what Windows scripting tool was most likely used to download and execute the malware? A. VBScript B. Python C. Bash D. PowerShell
D
3. Scoot notices that one of the systems on his network contacted a number of system via encrypted web traffic, downloaded a handful of files, and then uploaded a large amount of data to a remote system. what type of infection should he look for? A. A keylogger B. A backdoor C. A bot D. A logic bomb
C
4. Amanda notices traffic between her systems and a known malicious host on TCP port 6667u. what type of traffic is she most likely detecting? A. Command and control B. A hijacked web browser C. A RAT D. A worm
A
5. Mike discovers that attackers have left software that allows them ot have remote access to systems on a computer in his company's network. How hsould he describe or classify this malware? A. A worm B. Crypto malware C. A trojan D. A backdoor
D
C
7. What type of malware is adware typically classified as? A. A DOG B. A backdoor C. A PUP D. A rootkit
C
D
D
10. Cyrpto malware is a type of what sort of malware? A. Worms B. PUP C. Ransomware D. Rootkit
C
B
B
B
14. What type of malware is frequently called stalkerware because of its use by those in intimate relationships to spy on their partners? A. Worms B. RATs C. Crypto malware D. PUPs
B
B
16. what type of malware is VBA code most likely to show up in? A. Macro viruses B. RATs C. Worms D. Logic bombs
A
17. Angela wants tot limit the potential impact of malicious Bash scripts. Which of the following is the most effective technique she can use to do so without a significant usability impact for most users? A. disable Bash. B. Switch to another shell. C. Use Bash's restricted mode. D. Prevent execution of Bash scripts.
C
Fred receives a call to respond to a malware-infected system. When he arrives, he discovers a message on the screen that reads “Send .5 Bitcoin to t he following address to recover your files.” What is the most effective way for Fred to return the system to normal operation?
A. Pay the bitcoin ransom.
B. Wipe the system and reinstall.
C. Restore from a backup if available.
D. Run antimalware software to remove malware.
C
19. What type of malware connects to a command-and-control system, allowing attackers to manage, control, and update it remotely? A. A bot B. A drone C. A vampire D. A worm
A
C