Question:* Where might a spammer get your personal information from?
Answer: • All of these
Question:* Which of the following spam filtering techniques has the highest potential for generating false positives?
Answer: • Keyword Filtering
Question:* Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?
Answer: • collect email addresses
Question:* A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?
Answer: • Executables
Question:* Why shouldn't a user click unsubscribe links from spam messages?
Answer: • the click may validate the email address
Question:* What is an example of a Phishing scam?
Answer: • An email that appears to be legitimate, but is really being used to obtain personal or important information
Question:* In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?
Answer: • the attachment executes
Question:* What could be a good indicator of a Spam email?
Answer: • All of these
Question:* In order for antivirus programs to be most effective, it is necessary to keep which of the following up to date?
Answer: • Virus definition files
Question:* Malware is short for
Answer: • Malicious Software
Question:* What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?
Answer: • All of these
Question:* Which of the following is not a well known anti-virus program?
Answer: • SMAG
Question:* What is a captcha?
Answer: • It is a tool websites often use to prevent automated spammer bots from posting or registering on a website by forcing the user to do a task, often entering in letters or numbers based on a picture or audio, which verifies that they are human.
Question:* What are types of malware?
Answer: • All of these
Question:* How can you help stop spam?
Answer: • All of these
Question:* What is a keylogger?
Answer: • Software that records keystrokes made on a keyboard
Question:* Which of these is an example of a possible victim in a phishing attack?
Answer: • All of these
Question:* If you cannot delete malware infected file, what is good method to try first?
Answer: • Boot in Windows safe mode and attempt to delete the file
Question:* A virus can spread to another computer by
Answer: • Sharing an infected file with another computer
Question:* What is a computer virus?
Answer: • A type of malware that replicates itself and spreads to other files and/or computers.
Question:* Which of these techniques would be effective in helping to prevent phishing attacks by scammers?
Answer: • Scan for and fix XSS issues
Question:* What is the main difference between spyware and other malware?
Answer: • Spyware tends to steal or monitor data and/or personal information while malware encompasses all software that may been made with malicious intent in mind
Question:* What is a backdoor?
Answer: • A vulnerability in software that allows someone to bypass the normal authentication process
Question:* What is rogue security software?
Answer: • A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed.
Question:* What run command can you use to check what programs load on startup?
Answer: • msconfig
Question:* Which of the following sites provide services for users to setup disposable emails?
Answer: • jetable.org
Question:* What is a botnet?
Answer: • A collection of computers working together to perform a single task. These computers are often penetrated by software containing malware.
Question:* What is an example of a "419" Scam
Answer: • A con in which someone asks you for assistance in retrieving a vast sum of money. Often it involves you helping him or her pay off certain fees and in return they promise to share the money with you.
Question:* A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?
Answer: • Boot from a USB drive and run a program to remove the malware
Question:* Which is not an example of an anti-spyware tool?
Answer: • Kazaa
Question:* What is an example of a captcha?
Answer: • All of these
Question:* Virus infection via email attachments can be minimized using which of the following?
Answer: • Deleting mail containing attachments from unknown senders
Question:* Why are disposable email addresses useful?
Answer: • It is useful for someone who needs to give out their email or sign up to a website, but wants to protect their real email address from SPAM.
Question:* You have been told by several of your friends you have recently sent SPAM emails to them, what could be the cause of this and what should you do?
Answer: • A spammer or bot may have gained access to your email account and sent out SPAM to all of your contacts. You should change your password immediately.
Question:* Which of the following spam filtering issues stops valid messages from being delivered?
Answer: • false positives
Question:* Which is most likely something that could be considered strange account activity and may require further scrutiny on an e-commerce site?
Answer: • Orders from several user accounts are being sent to the same physical address
Question:* What is disposable email addressing?
Answer: • A practice in which you set a unique email address for sender/recipient communication. Disposable email addresses typically forward to one or more real email mailboxes where the owner can receive and read messages without revealing their true email.
Question:* What is ransomware?
Answer: • A software that hijacks your computer and asks you to pay in order for it to be removed
Question:* When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?
Answer: • Bounce messages
Question:* In order to help prevent spam, a honeypot performs which of the following functions?
Answer: • acts as a desirable mail server in order to lure spammers
Question:* Performing outbound spam filtering does which of the following for an organization?
Answer: • helps prevent blacklisting
Question:* Which of the following techniques requires posting an email address where only spammers would find it?
Answer: • Spam Traps
Question:* What is CryptoLocker?
Answer: • A type of ransomware which encrypts user files and demands payment for the decryption key.
Question:* Which of the following reduces spam by rejecting mail from a specific ip addresses?
Answer: • DNS Blacklisting
Question:* Antivirus programs hash files on a computer in order to detect which of the following activities?
Answer: • File content changes
Question:* How can delivering mail as text instead of html help prevent spam?
Answer: • text mail prevents web bugs from alerting spammer that the message was opened
Question:* Which type of analysis is an antivirus program performing when it observes a file's activities in a sandbox or decompiles a file and analyzes its instructions?
Answer: • Heuristic Analysis
Question:* Which of the following characteristics classify a mail message as spam?
Answer: • it is unsolicited and indiscriminately addressed
Question:* Antivirus signatures are constructed using with of the following?
Answer: • Hashes
Question:* What is email spoofing?
Answer: • When someone forges or makes it appear that a email being sent is from a particular sender when it really is being sent by someone else.
Question:* Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?
Answer: • WireShark
Question:* Which of the following is true of macro viruses?
Answer: • They depend on applications to propagate
Question:* In a compromised system, which of the following provides the safest way to analyze it?
Answer: • Live CD/DVD
Question:* Which of the following can prevent virus infections?
Answer: • Patching programs and the operating system
Question:* Is commercial SPAM legal in the United States?
Answer: • Yes, but only if it follows the standards listed in the CAN-SPAM Act of 2003
Question:* Which of the following differentiates a virus from a worm?
Answer: • a virus requires user interaction to infect a machine
Question:* Which of the following spam filtering techniques statistically analyzes mail?
Answer: • Bayesian Filtering
Question:* On a WordPress site, which is the default service/tool to prevent spammers from posting comments?
Answer: • Akismet
Question:* Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?
Answer: • Cloud Antivirus
Question:* Firewalls help to prevent which of the following malware from propagating?
Answer: • Worms
Question:* What is the difference between a worm and virus?
Answer: • Unlike a virus, a worm does not need to attach itself to a program to spread.
Question:* Most spyware is used to...
Answer: • track a user's movement on the web or display pop-up ads
Question:* Polymorphic viruses randomly generate which of the following items before infecting a new file?
Answer: • mutation engine
Question:* A virus can hide itself from an antivirus software by doing which of the following?
Answer: • intercepting operating system read and write requests
Question:* Which of the following is true of a trojan virus?
Answer: • a Trojan doesn't self-replicate
Question:* Which of the following sites use disposable email addressing?
Answer: • Craigslist
Question:* When using greylist filtering, a message will be considered legitimate if it does which of the following?
Answer: • sends its message more than once
Question:* Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?
Answer: • iRiot
Question:* In order to help prevent spam, a tarpit performs which of the following functions?
Answer: • delivers suspected spam messages more slowly
No comments:
Post a Comment