In: Computer Science
Question 11
Which of the following statements is NOT true about dictionary-based virus detection?
A. This method can detect a virus almost immediately.
B. This method scans applications and other files when they have access to your system.
C. The software must be updated to detect new viruses.
D. This method can detect viruses that it knows about and those it does not know about.
Question 12
Antivirus programs can use the suspicious behavior method to monitor the behavior of applications on a system.
True
False
Question 13
Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use to create a command prompt and redirect it to her local computer?
A. whois
B. netstat
C. nc
D. scp
Question 14
Which of the following is a type of malware designed to hold your data hostage?
A. Ransomware
B. Logic bomb
C. Spyware
D. Trojan
incident response course
Question 15
When a covert channel is in use, information is typically transferred in the open, but hidden within that information is the information the sender and receiver wish to keep confidential.
True
False
Question 11
Which of the following statements is NOT true about dictionary-based virus detection?
A. This method can detect a virus almost immediately.
B. This method scans applications and other files when they have access to your system.
C. The software must be updated to detect new viruses.
D. This method can detect viruses that it knows about and those it does not know about.
Ans. (D) This method can detect both viruses that it knows about and those it does not know about.
Question 12
Antivirus programs can use the suspicious behavior method to monitor the behavior of applications on a system.
True
False
Ans. True
Antivirus programs are based on many methods to identify a virus/trojan/malware, they use the suspicious behavior to analyse the suspected files and also monitors the behavior of applications on a system.
Question 13
Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use to create a command prompt and redirect it to her local computer?
A. whois
B. netstat
C. nc
D. scp
Ans. nc (Netcat commands)
Netcat commands are accessible through command prompt which reveals all the network traffic of a computer like TCP/UDP traffic, it could also give previlege to test the network with some advanced tools. Wendy can gain access to a vulnerable web server running Microsoft Windows and by using netcat commands she can create a command prompt and redirect traffic to her local computer.
Question 14
Which of the following is a type of malware designed to hold your data hostage?
A. Ransomware
B. Logic bomb
C. Spyware
D. Trojan
Ans. Worm
A worm is a type of software which makes copies of itself from one computer to other and damages the software programs, these are designed to hold data hostages.
Question 15
When a covert channel is in use, information is typically transferred in the open, but hidden within that information is the information the sender and receiver wish to keep confidential.
True
False
Ans. True
Covert channel is a technique where the sender and receiver wanted to send the secretive information without other knowing it. This channel will reveal all the security policies of the organization.