Where might a spammer get your personal information from?
Facebook
MySpace
LinkedIn
All of these
Which of the following spam filtering techniques has the highest potential for generating false positives?
Community Filtering
Bayesian Filtering
Challenge-Response Filtering
Keyword
Filtering
Why shouldn't a user click unsubscribe links from spam messages?
clicking the link will prevent
unsubscribing makes finding the sender difficult
the click may
validate the email address
What is an example of a Phishing scam?
An application that looks useful, but actually
contains spyware to slow down your computer
An email that
appears to be legitimate, but is really being used to obtain personal or
important information
Hacking into a computer and leaving false trails on
who did it
Installing a virus and then asking you to pay to
remove it
Malware is short for
Malicious
Software
Malicious Systems
Maliant Software
Maliant Systems
What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?
Users must associate a phone to their account and
confirm a number sent to them via text
Requiring users provide valid personal information
during sign up
All of these
Users that register must click on a confirmation
link to the email they specify in their profile
A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?
Text files
Executables
Header files
Source files
In order for antivirus programs to be most effective, it is necessary to keep which of the following up to date?
Web browsers
File hashes
Antivirus encryption keys
Virus definition
files
Which of the following is not a well known anti-virus program?
AVAST
SMAG
AVG
McAFee
What is a captcha?
A spam email that attempts to "capture"
information and then use that information to cause damage; the second phase is
often referred to as the "gotcha" phase.
An SPAM email written in all caps
It is a tool
websites often use to prevent automated spammer bots from posting or
registering on a website by forcing the user to do a task, often entering in
letters or numbers based on a picture or audio, which verifies that they are
human.
A group of characters in hidden in an email that
often includes code used in malware.
What are types of malware?
Viruses
Spyware
All of these
Worms
What could be a good indicator of a Spam email?
Something that sounds too good to be true
All of these
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?
the attachment is saved to the disk
the attachment is decompressed
the attachment opens in a preview editor
the attachment
executes
If you cannot delete malware infected file, what is good method to try first?
Reformat then attempt to delete the file
Run Windows Repair
Run Windows Restore
Boot in Windows
safe mode and attempt to delete the file
Which of these is an example of a possible victim in a phishing attack?
The website that was hacked
The person who had their identity stolen
All of these
The bank of the victim
What is a keylogger?
Software that that records keys you set when
encrypting files
Software that
records keystrokes made on a keyboard
Software used to log all attempts to access a
certain file
Software that steals passwords or "keys"
that you have saved on your computer
A virus can spread to another computer by
Sharing an
infected file with another computer
Through touch
Pinging other computers from the infected computer
Being on the same network as that computer
Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?
collect email
addresses
deny service to mail list recipients
introduce security holes into the list
What is a computer virus?
Software that steals files from your computer and
is used by blackmailers
Spyware that slows down a computer by sending
statistics to an unknown source
A type of
malware that replicates itself and spreads to other files and/or computers.
A software that hijacks your computer and asks you
to pay in order for it to be removed
Which of these techniques would be effective in helping to prevent phishing attacks by scammers?
Use IFRAME's
Allow XSS
Scan for and fix
XSS issues
Use Pop-ups
What run command can you use to check what programs load on startup?
cmd
ipconfig
msconfig
startup
A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?
Reinstall Windows
Reformat the computer
Boot from a USB
drive and run a program to remove the malware
Use Windows Restore
What is a botnet?
Software that automates networks
A program that sends emails repeatedly infecting
other computers who open it
A collection of malware stored in a network
A collection of
computers working together to perform a single task. These computers are often
penetrated by software containing malware.
What is rogue security software?
Security software that has been compromised to not
pick up certain threats
Security software that is no longer being used for
the purpose that was intended due to an exploit or hacker.
A fraudulent
security program that appears to be helpful, but is actually not. It may
deceive or mislead users into paying money to remove fake viruses or introduce
malware after it is installed.
Security software that considers data files or
programs as viruses, when they are not.
What is an example of a "419" Scam
Someone who uses social engineering to gain access
to your computer or personal information
Someone who sends you an email in hopes you open an
attachment which contains a virus
When you download a program that appears harmless,
but it actually installs spyware on your computer
A con in which
someone asks you for assistance in retrieving a vast sum of money. Often it
involves you helping him or her pay off certain fees and in return they promise
to share the money with you.
What is the main difference between spyware and other malware?
There is no difference
Spyware that slows down a computer by sending
statistics to an unknown source, while malware only includes threats from
inside your own computer
Malware monitors data usage, while spyware infects
your computer with viruses
Spyware tends to
steal or monitor data and/or personal information while malware encompasses all
software that may been made with malicious intent in mind
What is a backdoor?
A vulnerability
in software that allows someone to bypass the normal authentication process
It is a known bug or exploit hackers use to cause
software to behave in a way that was not intended by the manufacturer
It is where viruses store their source code and
begin to replicate
It is a way for spyware to leave a system without
any trace of it being there
Which of the following sites provide services for users to setup disposable emails?
jetable.org
gmail.com
yahoo.com
hotmail.com
Virus infection via email attachments can be minimized using which of the following?
Opening attachments from external hard drives
Copying attachments to special directories before
opening them
Right clicking attachments
Deleting mail
containing attachments from unknown senders
What is an example of a captcha?
An interactive program which have instructions that
read: "Move the triangle into the circle"
1 + 1 = ?
What are the characters in this picture?
All of these
You have been told by several of your friends you have recently sent SPAM emails to them, what could be the cause of this and what should you do?
A spammer may have infiltrated your email
provider's host and compromised your account. You should notify your email
provider.
A spammer or bot
may have gained access to your email account and sent out SPAM to all of your
contacts. You should change your password immediately.
A spammer has gained access to your email.
Unfortunately, the only thing you can do to prevent further SPAM is to close
your account and create a new email address.
A spammer is spoofing your email address. You
should tell your friends to block the email address.
Which is not an example of an anti-spyware tool?
Ad-Aware
Windows Defender
Spybot
Kazaa
Which of the following spam filtering issues stops valid messages from being delivered?
false positives
false negatives
Which is most likely something that could be considered strange account activity and may require further scrutiny on an e-commerce site?
A user logs in from another computer than the last
login
A user changes their email
Orders from
several user accounts are being sent to the same physical address
A user changes their more than once password
Why are disposable email addresses useful?
It is useful for
someone who needs to give out their email or sign up to a website, but wants to
protect their real email address from SPAM.
It is useful for spammers to create false email
addresses that does not exist in order to spoof the from email in their spam
messsages.
It is useful for spammers who want to send out a
one time mass email, but never use that same email address again
It is useful for people who do not want their
emails to be read
What is ransomware?
A nickname for types of spyware that require a
password on boot
Software that steals files from your computer and
is used by blackmailers
A software that
hijacks your computer and asks you to pay in order for it to be removed
Viruses that infect files and won't let you open
them unless you know a certain pass code
What is disposable email addressing?
A practice in which a spammer sends out mass emails
from a single email account, but never logs into that account again.
Email addresses that are not rea, but they appear
on the from section of an email. They are often used to help protect spammer's
from being traced.
Someone who creates an email for the sole purpose
of sending out spam
A practice in
which you set a unique email address for sender/recipient communication.
Disposable email addresses typically forward to one or more real email
mailboxes where the owner can receive and read messages without revealing their
true email.
When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?
Reject messages
Drop messages
Bounce messages
In order to help prevent spam, a honeypot performs which of the following functions?
acts as a
desirable mail server in order to lure spammers
delivers suspected spam messages more slowly
traps suspected spam messages
routes suspected spam to special enclaves in the
system
Which of the following techniques requires posting an email address where only spammers would find it?
Tarpits
Spam Traps
Blacklists
Antivirus programs hash files on a computer in order to detect which of the following activities?
File size changes
File permissions changes
File content
changes
Performing outbound spam filtering does which of the following for an organization?
helps prevent whitelisting
helps prevent
blacklisting
helps prevent spam trapping
What is CryptoLocker?
A module of the Windows BitLocker encryption
system.
A type of encrypted Linux file system.
A type of
ransomware which encrypts user files and demands payment for the decryption
key.
A malware class which is known for encrypting
itself to avoid detection.
Which type of analysis is an antivirus program performing when it observes a file's activities in a sandbox or decompiles a file and analyzes its instructions?
Performance Analysis
Heuristic
Analysis
Signature Analysis
Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?
WireShark
Malware Bytes
HighjackThis
HitmanPro
How can delivering mail as text instead of html help prevent spam?
text mail
prevents web bugs from alerting spammer that the message was opened
mail servers won't accept html messages if they are
in text mode
text is easier to analyze for spammer information
What is email spoofing?
Copying or forwarding emails and then editing their
To and From to make it appear that the email was originally sent to or from
someone else
When someone
forges or makes it appear that a email being sent is from a particular sender
when it really is being sent by someone else.
When someone sends an email that appears to look
like a legitimate, but it is actually not and is being used to obtain personal
or important information.
Sending an email through multiple accounts in order
to make it difficult to trace back the original email's sender address or
origin
Which of the following reduces spam by rejecting mail from a specific ip addresses?
URL Blacklisting
DNS Blacklisting
IMAP Blacklisting
POP3 Blacklisting
Antivirus signatures are constructed using with of the following?
Encryption Algorithms
Random Number Generators
Hashes
Cyclic Redundancy Checks
How can you help stop spam?
All of these
Block certain email addresses known for sending
spam
Setup email filters based on keywords known to be
in spam
Unsubscribe from listservs
Which of the following characteristics classify a mail message as spam?
it is solicited and indiscriminately addressed
it is
unsolicited and indiscriminately addressed
it is solicited and contains advertising
it is unsolicited and contains advertising
Which of the following is true of macro viruses?
They depend on the operating system to propagate
They are larger than traditional viruses
They depend on
applications to propagate
They are written in low-level languages to avoid
detection
Which of the following can prevent virus infections?
Implementing a firewall
Implementing an intrusion detection system
Patching
programs and the operating system
In a compromised system, which of the following provides the safest way to analyze it?
Live CD/DVD
Resident Antivirus Program
Live USB
Is commercial SPAM legal in the United States?
Yes because it is protected under the first
amendment
Yes, but only if it is an advertisement for a real
product.
Yes, but only if
it follows the standards listed in the CAN-SPAM Act of 2003
No
Which of the following differentiates a virus from a worm?
a worm requires user interaction to infect a
machine
a worm can infect multiple machines
a virus requires
user interaction to infect a machine
a virus can only infect a single machine
Which of the following spam filtering techniques statistically analyzes mail?
Keyword Filtering
Challenge-Response Filtering
Community Filtering
Bayesian
Filtering
Firewalls help to prevent which of the following malware from propagating?
Encrypted viruses
Worms
Polymorphic viruses
Trojan viruses
On a WordPress site, which is the default service/tool to prevent spammers from posting comments?
Website Inspector
Akismet
MailWasher Pro
SpamAssassin
What is the difference between a worm and virus?
A worm does not replicate itself like a virus does,
but rather moves from computer to computer
A virus infects files, while a worm eats them
A worm is a virus created for a very specific
purpose
Unlike a virus,
a worm does not need to attach itself to a program to spread.
Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?
Client/Server Antivirus
Internet OS Antivirus
Cloud Antivirus
Web Antivirus
Most spyware is used to...
track a user's
movement on the web or display pop-up ads
steal sensitive information on a computer in order
to blackmail you
slow down computers for the sole purpose of
maliciousness
create a backdoor
Polymorphic viruses randomly generate which of the following items before infecting a new file?
mutation engine
virus body
decryption routine
A virus can hide itself from an antivirus software by doing which of the following?
intercepting
operating system read and write requests
replacing an executable file with its payload
appending itself to an executable file
compressing itself in a zip file
Which of the following is true of a trojan virus?
a trojan reproduces by infecting other files
a Trojan doesn't
self-replicate
a trojan inserts a copy of itself into another
program
Which of the following sites use disposable email addressing?
Craigslist
All of these
Amazon
Walmart
When using greylist filtering, a message will be considered legitimate if it does which of the following?
contains a sender and subject line
is not a multipart message
sends its
message more than once
sends its message without html markup
Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?
iRiot
Elk Cloner
The Michelangelo Virus
The ILOVEYOU Worm
In order to help prevent spam, a tarpit performs which of the following functions?
traps suspected spam messages
routes suspected spam to special enclaves in the
system
acts as a desirable mail server in order to lure
spammers
delivers
suspected spam messages more slowly