3.4.4 Check Your Understanding – Malware Answers

1. Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.

  • Adware
  • Rootkit
  • Spyware
  • Virus
  • Worm

Explanation: A worm executes arbitrary code and installs copies of itself in the memory of the infected computer. The main purpose of this malware is to automatically replicate from system to system across the network.

2. Which malware is non-self-replicating type of malware? It often contains malicious code that is designed to look like something else, such as a legitimate application or file. It attacks the device from within.

  • Adware
  • Rootkit
  • Spyware
  • Trojan Horse
  • Worm

Explanation: Trojan horse is non-self-replicating type of malware. It often contains malicious code that is designed to look like something else, such as a legitimate application or file. It attacks the device from within.

3. Which malware is used to gather information about a user and then, without the user’s consent, sends the information to another entity?

  • Adware
  • Rootkit
  • Spyware
  • Virus
  • Ransomware

Explanation: Spyware is similar to adware but is used to gather information about the user and then send it to threat actors without the user’s consent. Spyware can be a low threat, gathering browsing data, or it can be a high threat capturing personal and financial information.

4. Which malware typically displays annoying pop-ups to generate revenue for its author?

  • Adware
  • Rootkit
  • Spyware
  • Virus
  • Worm

Explanation: Adwareis usually distributed by downloading online software. It can display unsolicited advertising using pop-up web browser windows, new toolbars, or unexpectedly redirect a webpage to a different website.

5. Which malware is installed on a compromised system and provides privileged access to the threat actor?

  • Adware
  • Virus
  • Spyware
  • Rootkit
  • Worm

Explanation: Rootkitsare used by threat actors to gain administrator account-level access to a computer. They are very difficult to detect because they can alter firewall, antivirus protection, system files, and even OS commands to conceal their presence.

6. Which malware denies access to the infected computer system and demands payment before the restriction is removed?

  • Adware
  • Rootkit
  • Spyware
  • Virus
  • Ransomware

Explanation: Ransomware typically denies a user access to their files by encrypting the files and then displaying a message demanding a ransom for the decryption key.


guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x