Which type of malware tricks a user into running

CompTIA A+ 1000 – Part 2

 Module 10: Security Fundamentals

 

1. Which type of malware tricks a user into running a program which subsequently does something totally different than what the user had expected?
Choose one answer.

  • Worm
  • Trojan virus
  • Ransomware
  • Spyware

==============================================

 

2. RAID is utilized to store duplicated data on multiple discs providing multiple backups. Which level of RAID requires a minimum of three drives and writes to all of them?
Choose one answer.

  • RAID Level 5
  • RAID Level 3
  • RAID Level 0
  • RAID Level 1

==============================================

 

3. Which of these is a type of network attack in which a hacker modifies the source address of the network packet to alter it and make it look as though it were coming from another sender?
Choose one answer.

  • Spoofing
  • Session hijacking
  • Zero-day attack
  • Eavesdropping attack

==============================================

 

4. If you wanted to encrypt communications from an employee’s computer back to the office network, which of these would you use?
Choose one answer.

  • Access-control list
  • DLP
  • VPN
  • Directory permissions

==============================================

 

5. Highly-secure environments use multiple authentication techniques. Which of these is NOT included in the three types of authentication?
Choose one answer.

  • Something you know
  • Something you have
  • Something you are
  • Something you need

==============================================

 

6. There are three types of backups and each has a different application. If you were performing a backup that copied any files that had been changed and clears the archive bit you would be performing which type of backup?
Choose one answer.

  • Incremental backup
  • Full backup
  • Differential backup
  • None of these

==============================================

 

7. True or False: Authentication is the process of proving an identity to a network.
Answer true or false

  • True
  • False

==============================================

 

8. If a network were attacked with a virus that prevents the system from performing its normal function or replies that the system is busy, which of these may have occurred?
Choose one answer.

  • Man-in-the-middle attack
  • Eavesdropping attack
  • Spoofing
  • Denial-of-service

==============================================

 

9. Physical security ensures people cannot physically access a system. What type of physical security is used which will notify you if a cover is taken off a system?
Choose one answer.

  • Intrusion detection
  • Passwords
  • Secure server replacement
  • Trusted platform module

==============================================

 

10. A type of encryption, commonly used on websites, which encrypts traffic by applying a digital certificate is __________.
Choose one answer.

  • Secure Sockets Layer (SSL)
  • Internet Protocol Security (IPSec)
  • Virtual Private Network (VPN)
  • COMSEC