Question :
51) For which of the following purposes botnets most likely : 1283624
51) For which of the following purposes are botnets most likely to be used?
A) capturing Internet users’ sensitive information
B) attracting different types of malware to track their origins
C) encrypting critical information to protect from loss or corruption
D) track and eliminate computer worms and viruses
52) When does a computer become a “zombie”?
A) when it becomes immune to botnets
B) when it enters a secure site
C) when it is infected by malware
D) when it is hidden behind a firewall
53) Z Category is a security firm based in Oakland, California. The firm provides security detail for major Hollywood events and also personal security services to some celebrities. Jackson Keynes is a systems administrator for the firm. He comes across a USB drive lying abandoned in the reception area at the company office and decides to check its contents. Unknown to him, a spyware program downloads itself onto Jackson’s computer and infiltrates the central server system through the network. Which of the following is the most likely outcome in this case?
A) The program encodes all the information on the company’s servers and other systems and renders it unreadable and useless.
B) A tabloid reporter who had planted the USB drive accesses scandalous information about celebrities and publishes stories about them.
C) The company’s servers and individual computer systems are controlled by remotely located bots and are used to perform distributed denial of service attacks.
D) The spyware program replicates rapidly across the company network, clogs up the network speeds, and slows down the performance of the computers.
54) Which of the following is an accurate definition of a computer virus?
A) It is a software program that can damage files or other programs.
B) It is a software program that attracts potentially malicious attacks to study their origin.
C) It is a software program that masks the browsing history and preferences of Internet users.
D) It is a software program that inspects incoming or outgoing traffic to a computer network.
55) The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to the computer, as for a botnet.
A) honeypot
B) Trojan horse
C) firewall
D) black swan
56) Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her e-mail communications, etc. Data gathered from the monitoring activity is sent to a remotely placed hacker. Which of the following software programs is most likely to have infected Evelyn’s computer?
A) spyware
B) web crawler
C) black swan
D) firewall
57) In Internet terminology, a worm refers to a(n)________.
A) e-mail program created not for communication, but to lure spam
B) software program that attracts malicious attacks in order to study their properties and origins
C) self-replicating program that sends copies to other nodes on a computer network
D) software tool used to inspect incoming and outgoing traffic to a computer network
58) Which of the following is an accurate definition of keylogger?
A) a process which helps a user increase productivity by tracking the keys entered by him
B) a monitoring software that records a user’s keystrokes
C) a software that prevents fraudsters from hacking into e-mail accounts
D) a program that controls permissions for web traffic into and out of a computer network
59) ________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash.
A) Distributed denial of service
B) Social engineering
C) Keylogging
D) Phishing
60) Janet Shulz received an e-mail that contained a link to a website that imitated the authentic website of her bank. The e-mail requested her to key in her credit card number, her Social Security Number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________.
A) distributed denial of service
B) keylogging
C) phishing
D) cache poisoning