A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed concern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
A. Backdoor
B. Logic bomb
C. Rootkit
D. Botnet
Answer: A. Backdoor
Learn More :
Cyber Security
- What is the purpose of suspending a digital certificate rather than revoking it?
- How does an attacker successfully alter a message that was sent with a digital certificate?
- What is concerning about entry-level certificates?
- On which of the following devices is IPsec likely to be implemented?
- Which of the following is used to digitally sign a certificate?
- If a browser cannot connect to the OSCP responder, what does the browser receive in return?
- Why would an administrator NOT renew a key?
- What is involved in key escrow?
- A hierarchical trust model signs digital certificate authorities with how many keys?
- PKI consists of all of the following EXCEPT what?
- Which of the following does a digital certificate NOT contain?
- How can an EV SSL help users avoid dangerous sites?
- Why is a pre-master secret an important component of a web browser and web server handshake?
- Why would an administrator choose to use multiple Registration Authorities when processing certificate requests?
- Public Key Cryptography Standards are based on which of the following?
- Where are private keys NOT stored?
- How are TLS and SSL currently different in regards to security?
- What is the biggest difference between a CA and an RA?
- Which of the following is provided by a server digital certificate?
- Which of the following explains the importance of a "facilitator?"
- NTRUEncrypt is based on which cryptography method?
- "Plaintext" is a term that is best described as what?
- Which of the following is an advantage of the Keccak algorithm?
- What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet?
- Why is a homoalphabetic substitution considered a stream cipher?
Malware Types
- Homer received an email advertising the newest version of a popular smartphone, which is not available elsewhere. It includes a malicious link. Which of the following principles is the email author using?
- Your organization recently suffered a loss from malware that wasn't previously known by any trusted sources. Which type of attack is this?
- Bart is complaining that new browser windows keep opening on his computer. Which of the following is the BEST choice to stop these in the future?
- A user wants to reduce the threat of an attacker capturing her personal information while she surfs the Internet. Which of the following is the BEST choice?
- You manage a group of computers in an isolated network without Internet access. You need to update the antivirus definitions manually on these computers. Which of the following choices is the MOST important concern?
- Attackers are targeting C-level executives in your organization. Which type of attack is this?
- A recent spear phishing attack that appeared to come from your organization's CEO resulted in several employees revealing their passwords to attackers. Management wants to implement a security control to provide assurances to employees that email that appears to come from the CEO actually came from the CEO. Which of the following should be implemented?
- Marge reports that she keeps receiving unwanted emails about personal loans. What does this describe?
- While cleaning out his desk, Bart threw several papers containing PII into the recycle bin. Which type of attack can exploit this action?
- An organization's security policy requires employees to incinerate paper documents. Of the following choices, which type of attack is this MOST likely to prevent?
- Bart is in a break area outside the office. He told Lisa that he forgot his badge inside and asked Lisa to let him follow her when she goes back inside. What does this describe?
- A security administrator at a shopping mall discovered two wireless cameras pointing at an automatic teller machine. These cameras were not installed by mall personnel and are not authorized. What is the MOST likely goal of these cameras?
- Lisa is a database administrator and received a phone call from someone identifying himself as a technician working with a known hardware vendor. The technician said he's aware of a problem with database servers they've sold, but it only affects certain operating system versions. He asks Lisa what operating system the company is running on its database servers. Which of the following choices is the BEST response from Lisa?
- Of the following malware types, which one is MOST likely to monitor a user's computer?
- What type of malware uses marketing pop-ups and does not attempt to hide itself?
- A security administrator recently noticed abnormal activity on a workstation. It is connecting to computers outside the organization's internal network, using uncommon ports. Using a security toolkit, the administrator discovered the computer is also running several hidden processes. Which of the following choices BEST indicates what the administrator has found?
- After Maggie turned on her computer, she saw a message indicating that unless she made a payment, her hard drive would be formatted. What does this indicate?
- Recently, malware on a company computer destroyed several important files after it detected that Homer was no longer employed at the company. Which of the following BEST identifies this malware?
- Which of the following types of malware is the MOST difficult to reverse engineer?