Technical Security Controls
Access Controls: Implement strong user authentication mechanisms, such as passwords, multi-factor authentication, and access privileges.
Virus
Note: Understanding the behaviour and characteristics of different types of viruses is essential for implementing effective countermeasures and mitigating their impact.
What is a virus?
A) A piece of software code that attaches itself to executable programs
B) A hardware component that stores data
C) A type of firewall used to protect networks
D) A physical disease that affects computers
A) A piece of software code that attaches itself to executable programs
A virus is a type of malicious software (malware) that infects executable programs by attaching its code to them. When an infected program is executed, the virus activates and can perform various malicious actions, such as replicating itself, altering or corrupting data, or causing damage to the system. Viruses rely on the execution of the host program to spread and carry out their intended actions. They do not function independently and require a host program to execute their code. This characteristic distinguishes viruses from other types of malware like worms or Trojans, which can operate on their own without needing a host program.
Which type of virus infects executable files by modifying their code?
A) File infector virus
B) Boot sector virus
C) Macro virus
D) Script virus
A) File infector virus
File infector viruses are a type of virus that infects executable files by modifying their code. When an infected program is executed, the virus replicates itself and attaches to other executable files, spreading the infection.
What triggers the activation and spread of a virus?
A) Dormant state on a hard disk
B) Replication through email attachments
C) Execution of its host program
D) Automatic propagation to other machines
C) Execution of its host program
The activation and spread of a virus are triggered when its host program is executed. The virus requires the host program to execute in order to function and replicate itself. Without the execution of the host program, the virus remains dormant and does not cause any damage or spread to other files or systems.
Which type of virus infects documents or files supporting macro functionality?
A) File infector virus
B) Boot sector virus
C) Macro virus
D) Script virus
C) Macro virus
Macro viruses are specifically designed to infect documents or files that support macro functionality, such as Word documents or Excel spreadsheets. They exploit the macro programming language to execute malicious code and spread the infection to other documents or files that are accessed or opened with macro support enabled.
Worms
What is a worm?
A. A self-replicating program that spreads over a network without human intervention.
B. A type of computer virus that attaches itself to executable programs.
C. Malicious code that modifies the boot sector of a computer’s hard disk.
D. A program that automatically executes a sequence of commands or actions.
A) A self-replicating program that spreads over a network without human intervention.
A worm is a specific type of malware that is capable of independently spreading and replicating over a network without any human interaction. Unlike viruses, which require user actions or the execution of a host program, worms can move from one system to another automatically, infecting multiple computers along the way. This characteristic makes worms particularly dangerous and challenging to contain once they are unleashed on a network.
What is a characteristic feature of worms?
A. They require human intervention to spread.
B. They attach themselves to executable programs.
C. They replicate independently over a network.
D. They can only infect email attachments.
C. They replicate independently over a network.
Unlike viruses that require human intervention or the execution of a host program, worms have the ability to spread and replicate over a network without any human interaction. This characteristic sets them apart from other types of malware.
How do worms differ from viruses?
A. Worms spread over a network without human intervention.
B. Worms require a host program to execute and replicate.
C. Worms can only infect files in the boot sector.
D. Worms can only spread through email attachments.
A. Worms spread over a network without human intervention.
While viruses typically rely on user actions or the execution of a host program, worms can self-propagate and spread autonomously over a network, infecting multiple systems in a short amount of time.
What is a common impact of worm infections?
A. Slow network performance and congestion.
B. Corruption of data stored on infected systems.
C. Execution of malicious code on the host program.
D. Physical damage to computer hardware.
A. Slow network performance and congestion.
Worm infections can lead to significant network congestion and reduced performance due to the rapid replication and distribution of the worm across multiple systems. The sheer volume of network traffic generated by worm propagation can overwhelm network infrastructure and cause disruptions. While other options may also occur in some cases, network performance issues are a common and prominent consequence of worm infections.
Rootkits & Logic Bombs
Rootkits:
Logic Bombs:
What is the primary characteristic of a rootkit?
A) It replicates itself across multiple systems
B) It inserts itself into the core part of the operating system
C) It triggers destructive actions at a specific time
D) It intercepts network traffic and captures sensitive data
B) It inserts itself into the core part of the operating system
A rootkit is malicious code that embeds itself into the core part of an operating system, typically the system kernel.
How do rootkits differ from viruses?
A) Rootkits replicate themselves, while viruses do not
B) viruses attach themselves to executable files, while Rootkits target the system kernel
C) Rootkits can be easily detected by antivirus software, while viruses are difficult to detect
D) Rootkits are spread through email attachments, while viruses spread through network vulnerabilities
B) viruses attach themselves to executable files, while Rootkits target the system kernel
Rootkits embed themselves into the core part of the operating system, while viruses typically attach themselves to executable files.
What distinguishes a logic bomb from a virus or a rootkit?
A) Logic bombs can replicate themselves, while viruses and rootkits cannot
B) Logic bombs remain dormant until specific conditions are met, while viruses and rootkits are always active
C) Logic bombs intercept system calls and modify them, while viruses and rootkits capture keystrokes
D) Logic bombs require human intervention to spread, while viruses and rootkits spread automatically
B) Logic bombs remain dormant until specific conditions are met, while viruses and rootkits are always active
A logic bomb is a malicious program that remains inactive until specific circumstances or conditions occur, triggering its execution. In contrast, viruses and rootkits are active and can propagate without specific triggers.
What is a logic bomb?
A) Malicious code that replicates itself across multiple systems
B) Malware that inserts itself into the core part of the operating system
C) A program that remains dormant until specific conditions are met, then executes destructive actions
D) Malicious software that intercepts system calls and modifies them
C) A program that remains dormant until specific conditions are met, then executes destructive actions
A logic bomb is a type of malicious program that is designed to remain inactive until certain conditions are met, such as a specific date or event. Once those conditions are fulfilled, the logic bomb activates and executes its destructive payload, which can involve actions like deleting files or formatting disks.
What is a rootkit?
A) Malware that spreads through network connections
B) Malicious software that intercepts system calls and modifies them
C) A program that remains dormant until specific conditions are met, then executes destructive actions
D) Malicious code that inserts itself into the core part of the operating system
D) Malicious code that inserts itself into the core part of the operating system
A rootkit is a type of malicious code that infiltrates the core components of an operating system, typically the system kernel. It operates at a privileged level and can intercept system calls, modify their behaviour, and evade detection by security measures. Rootkits are designed to give unauthorized control and access to an attacker while remaining hidden from normal system operations and security mechanisms.
Code Injections
What is the primary cause of code injection vulnerabilities?
A) Weak network security measures
B) Insufficient hardware resources
C) Poor programming practices
D) Outdated antivirus software
C) Poor programming practices
Code injection vulnerabilities primarily occur due to poor programming practices that allow programs to accept and execute code without proper validation. This allows attackers to inject and execute malicious code, leading to unauthorized actions or undesired outcomes.
Which of the following is an example of code injection?
A) Denial of Service (DoS) attack
B) Cross-Site Scripting (XSS)
C) Man-in-the-Middle (MitM) attack
D) Social engineering attack
B) Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) is an example of code injection. It involves injecting malicious scripts into web pages viewed by other users. By doing so, attackers can manipulate the functionality of the web page and potentially steal sensitive information or perform unauthorized actions on behalf of the user.
How can code injection attacks be mitigated?
A) Implementing robust input validation
B) Increasing network bandwidth
C) Disabling firewalls
D) Ignoring software updates
A) Implementing robust input validation
Code injection attacks can be mitigated by implementing robust input validation practices. This involves validating and sanitizing all user input to ensure it meets the expected format and does not contain any malicious code. By properly validating input, the risk of code injection vulnerabilities can be significantly reduced. The other options, such as increasing network bandwidth, disabling firewalls, or ignoring software updates, are not effective measures for mitigating code injection attacks.
Adware and Spyware
Which of the following best describes adware?
A) Malicious software that secretly collects user information
B) Unwanted software that displays intrusive advertisements
C) Software that encrypts files and demands a ransom for their release
D) Software that exploits vulnerabilities to gain unauthorized access
B) Unwanted software that displays intrusive advertisements
Adware refers to unwanted software that displays intrusive advertisements on a user’s device. It is designed to generate revenue for the developers by promoting products or services through aggressive or deceptive means. While adware can be annoying, it is generally not as malicious as software that secretly collects user information or exploits vulnerabilities.
How is spyware typically installed on a user’s device?
A) Through deceptive methods such as bundled software or malicious downloads
B) Via phishing emails that trick users into clicking on malicious links
C) By exploiting vulnerabilities in the device’s operating system
D) Through physical access to the device by an attacker
A) Through deceptive methods such as bundled software or malicious downloads
Spyware is typically installed on a user’s device through deceptive methods such as bundled software or malicious downloads. It may be included in software packages or downloads without the user’s knowledge or consent. It is important to exercise caution when downloading software from unfamiliar sources to avoid inadvertently installing spyware