SlideShare a Scribd company logo
1 of 6
Download to read offline
Question 16 (1 point)
Which of the following best describes the difference between a virus and a worm?
Question 16 options:
A worm is malicious software that requires a host file to spread itself, whereas a virus is
malicious software that does not require a host file to spread itself.
A virus is malicious software that requires a host file to spread itself, whereas a worm is
malicious software that does not require a host file to spread itself.
A virus is malicious software that attaches itself to executable files, whereas a worm is malicious
software that attaches itself to an image file.
There is no difference between a virus and a worm.
Question 17 (1 point)
Which of the following is an example of a malware prevention control?
Question 17 options:
Not allowing users to have administrative rights to their workstations
User awareness to recognize and report suspicious activity
Real-time firewall detection of suspicious file downloads
Review and analysis of log files
Question 18 (1 point)
Which of the following statements about Trojans is true?
Question 18 options:
Trojans need user interaction to spread.
Trojans are legitimate programs that enhance user experience.
Trojans reproduce by infecting other files.
Trojans self-replicate.
Question 19 (1 point)
Which of the following statements best describes data replication?
Question 19 options:
The process of copying data to a second location that is available for immediate use
The process of copying and storing data that could be restored to its original location
The process of copying data to another drive weekly
The process of copying data to the cloud
Question 20 (1 point)
Which of the following statements about data backup is not true?
Question 20 options:
Backups do not have to be restored as long as they are stored in the cloud.
Backups can be stored to a tape.
Backups can be stored in the cloud.
Backups can be conducted once a week.
Question 21 (1 point)
Which of the following statements about antivirus software is not true?
Question 21 options:
Antivirus software can detect, contain, or eliminate malware.
Antivirus software can detect various types of malware.
Antivirus software is 100 percent effective against malware intrusions.
Antivirus software uses signature-based recognition and behavior-based recognition to detect
malware.
Question 22 (1 point)
Which of the following malware takes advantage of a security vulnerability on the same day that
the vulnerability becomes known to the public?
Question 22 options:
Bot
Screen scraper
Ransomware
Zero-day exploit
Question 23 (1 point)
Which of the following is a snippet of code designed to automate tasks and often used by
attackers to carry out denial-of-service attacks?
Question 23 options:
Ransomware
Screen scraper
Zero-day exploit
Bot
Question 24 (1 point)
Which of the following is an example of ransomware that takes a computer or its data hostage in
an effort to extort money from victims?
Question 24 options:
WannaCry
Slammer
Sapphire
SpyEye
Question 25 (1 point)
Which of the following best describes the log analysis technique called trend analysis?
Question 25 options:
Compares log data to known good activity
Compares log data to known bad activity
Identifies activity over time that in isolation might appear normal
Ties individual entries together based on related information
Question 26 (1 point)
Which of the following log analysis techniques compares the log entries against a set of known
bad activity?
Question 26 options:
Trend analysis
Sequencing analysis
Correlation analysis
Signature analysis
Question 27 (1 point)
Which common standard operating procedure (SOP) format should be used for long procedures
requiring many decisions?
Question 27 options:
Flowchart
Simple step
Graphical
Hierarchical
Question 28 (1 point)
Which of the following refers to an internal procedure by which authorized changes are made to
software, hardware, network access privileges, or business processes?
Question 28 options:
NIST framework
Change control
Patch management
Standard operating procedure
Question 29 (1 point)
Which of the following is the standard protocol for sending email messages?
Question 29 options:
SMTP
FTP
SSL
IPsec
Question 30 (1 point)
Which of the following describes the process or methodology used to assess the adequacy of a
service provider?
Question 30 options:
Sequencing
Due care
Due diligence
Trend analysis
A worm is malicious software that requires a host file to spread itself, whereas a virus is
malicious software that does not require a host file to spread itself.
A virus is malicious software that requires a host file to spread itself, whereas a worm is
malicious software that does not require a host file to spread itself.
A virus is malicious software that attaches itself to executable files, whereas a worm is
malicious software that attaches itself to an image file.
There is no difference between a virus and a worm.
Question 16 (1 point)   Which of the following best describes the diff.pdf

More Related Content

Similar to Question 16 (1 point) Which of the following best describes the diff.pdf

Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
Tyler Shields
 

Similar to Question 16 (1 point) Which of the following best describes the diff.pdf (20)

Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com  Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com
 
CIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.comCIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.com
 
CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   
 
CIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.comCIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.com
 
CIS 333 Effective Communication - tutorialrank.com
CIS 333  Effective Communication - tutorialrank.comCIS 333  Effective Communication - tutorialrank.com
CIS 333 Effective Communication - tutorialrank.com
 
Cis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.comCis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.com
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
 
Network security interview questions & answers
Network security interview questions & answersNetwork security interview questions & answers
Network security interview questions & answers
 
Slide Intervento Zanero Giornata del Perito 2015
Slide Intervento Zanero Giornata del Perito 2015Slide Intervento Zanero Giornata del Perito 2015
Slide Intervento Zanero Giornata del Perito 2015
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 
CIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.comCIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.com
 
CIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.comCIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.com
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
 
CIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comCIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.com
 
Cis 333 Enhance teaching / snaptutorial.com
Cis 333   Enhance teaching / snaptutorial.comCis 333   Enhance teaching / snaptutorial.com
Cis 333 Enhance teaching / snaptutorial.com
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
 
Short definitions of all testing types
Short definitions of all testing typesShort definitions of all testing types
Short definitions of all testing types
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 

More from mail231065

Question 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdfQuestion 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdf
mail231065
 
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
Question 14 (1 point)   What is an intranet- Question 14 options-.pdfQuestion 14 (1 point)   What is an intranet- Question 14 options-.pdf
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
mail231065
 

More from mail231065 (20)

question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdfquestion 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
 
Question 2 1 pts What is the purpose of alt attribute with the image t.pdf
Question 2 1 pts What is the purpose of alt attribute with the image t.pdfQuestion 2 1 pts What is the purpose of alt attribute with the image t.pdf
Question 2 1 pts What is the purpose of alt attribute with the image t.pdf
 
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdf
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdfQuestion 2 Evaluate the advantages and disadvantages of the entry mode.pdf
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdf
 
Question 2 1 pts Consider the tree diagram from the previous question-.pdf
Question 2 1 pts Consider the tree diagram from the previous question-.pdfQuestion 2 1 pts Consider the tree diagram from the previous question-.pdf
Question 2 1 pts Consider the tree diagram from the previous question-.pdf
 
QUESTION 2 A research design measures.pdf
QUESTION 2 A                                  research design measures.pdfQUESTION 2 A                                  research design measures.pdf
QUESTION 2 A research design measures.pdf
 
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdfQuestion 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
 
QUESTION 16 Which of the following algorithms is correct for applying.pdf
QUESTION 16 Which of the following algorithms is correct for applying.pdfQUESTION 16 Which of the following algorithms is correct for applying.pdf
QUESTION 16 Which of the following algorithms is correct for applying.pdf
 
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdfQUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
 
QUESTION 15 According to the Harris and Todaro model- when the populat.pdf
QUESTION 15 According to the Harris and Todaro model- when the populat.pdfQUESTION 15 According to the Harris and Todaro model- when the populat.pdf
QUESTION 15 According to the Harris and Todaro model- when the populat.pdf
 
Question 17 - For items that are manufactured or produced within the c.pdf
Question 17 - For items that are manufactured or produced within the c.pdfQuestion 17 - For items that are manufactured or produced within the c.pdf
Question 17 - For items that are manufactured or produced within the c.pdf
 
Question 15 010-5pts Which of the following is true of the diaphysis-.pdf
Question 15 010-5pts Which of the following is true of the diaphysis-.pdfQuestion 15 010-5pts Which of the following is true of the diaphysis-.pdf
Question 15 010-5pts Which of the following is true of the diaphysis-.pdf
 
Question 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdfQuestion 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdf
 
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
Question 14 (1 point)   What is an intranet- Question 14 options-.pdfQuestion 14 (1 point)   What is an intranet- Question 14 options-.pdf
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
 
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdf
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdfQuestion 12 2-5-3 points Which part(s) of the brain play a large role.pdf
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdf
 
Question 12 (1 point) Despite their differences- all environmentalis.pdf
Question 12 (1 point)   Despite their differences- all environmentalis.pdfQuestion 12 (1 point)   Despite their differences- all environmentalis.pdf
Question 12 (1 point) Despite their differences- all environmentalis.pdf
 
Question 12 Refer to the diagram for a private closed economy- The upw.pdf
Question 12 Refer to the diagram for a private closed economy- The upw.pdfQuestion 12 Refer to the diagram for a private closed economy- The upw.pdf
Question 12 Refer to the diagram for a private closed economy- The upw.pdf
 
Question 10 What is the output from the following program- void main().pdf
Question 10 What is the output from the following program- void main().pdfQuestion 10 What is the output from the following program- void main().pdf
Question 10 What is the output from the following program- void main().pdf
 
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdfQuestion 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
 
Question 12 ( 1 point) Saved According to the phylogenetic tree in th.pdf
Question 12 ( 1 point)  Saved According to the phylogenetic tree in th.pdfQuestion 12 ( 1 point)  Saved According to the phylogenetic tree in th.pdf
Question 12 ( 1 point) Saved According to the phylogenetic tree in th.pdf
 
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdfQuestion 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 

Question 16 (1 point) Which of the following best describes the diff.pdf

  • 1. Question 16 (1 point) Which of the following best describes the difference between a virus and a worm? Question 16 options: A worm is malicious software that requires a host file to spread itself, whereas a virus is malicious software that does not require a host file to spread itself. A virus is malicious software that requires a host file to spread itself, whereas a worm is malicious software that does not require a host file to spread itself. A virus is malicious software that attaches itself to executable files, whereas a worm is malicious software that attaches itself to an image file. There is no difference between a virus and a worm. Question 17 (1 point) Which of the following is an example of a malware prevention control? Question 17 options: Not allowing users to have administrative rights to their workstations User awareness to recognize and report suspicious activity Real-time firewall detection of suspicious file downloads Review and analysis of log files Question 18 (1 point) Which of the following statements about Trojans is true? Question 18 options: Trojans need user interaction to spread. Trojans are legitimate programs that enhance user experience. Trojans reproduce by infecting other files. Trojans self-replicate. Question 19 (1 point)
  • 2. Which of the following statements best describes data replication? Question 19 options: The process of copying data to a second location that is available for immediate use The process of copying and storing data that could be restored to its original location The process of copying data to another drive weekly The process of copying data to the cloud Question 20 (1 point) Which of the following statements about data backup is not true? Question 20 options: Backups do not have to be restored as long as they are stored in the cloud. Backups can be stored to a tape. Backups can be stored in the cloud. Backups can be conducted once a week. Question 21 (1 point) Which of the following statements about antivirus software is not true? Question 21 options: Antivirus software can detect, contain, or eliminate malware. Antivirus software can detect various types of malware. Antivirus software is 100 percent effective against malware intrusions. Antivirus software uses signature-based recognition and behavior-based recognition to detect malware. Question 22 (1 point) Which of the following malware takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the public?
  • 3. Question 22 options: Bot Screen scraper Ransomware Zero-day exploit Question 23 (1 point) Which of the following is a snippet of code designed to automate tasks and often used by attackers to carry out denial-of-service attacks? Question 23 options: Ransomware Screen scraper Zero-day exploit Bot Question 24 (1 point) Which of the following is an example of ransomware that takes a computer or its data hostage in an effort to extort money from victims? Question 24 options: WannaCry Slammer Sapphire SpyEye Question 25 (1 point) Which of the following best describes the log analysis technique called trend analysis? Question 25 options:
  • 4. Compares log data to known good activity Compares log data to known bad activity Identifies activity over time that in isolation might appear normal Ties individual entries together based on related information Question 26 (1 point) Which of the following log analysis techniques compares the log entries against a set of known bad activity? Question 26 options: Trend analysis Sequencing analysis Correlation analysis Signature analysis Question 27 (1 point) Which common standard operating procedure (SOP) format should be used for long procedures requiring many decisions? Question 27 options: Flowchart Simple step Graphical Hierarchical Question 28 (1 point) Which of the following refers to an internal procedure by which authorized changes are made to software, hardware, network access privileges, or business processes? Question 28 options: NIST framework
  • 5. Change control Patch management Standard operating procedure Question 29 (1 point) Which of the following is the standard protocol for sending email messages? Question 29 options: SMTP FTP SSL IPsec Question 30 (1 point) Which of the following describes the process or methodology used to assess the adequacy of a service provider? Question 30 options: Sequencing Due care Due diligence Trend analysis A worm is malicious software that requires a host file to spread itself, whereas a virus is malicious software that does not require a host file to spread itself. A virus is malicious software that requires a host file to spread itself, whereas a worm is malicious software that does not require a host file to spread itself. A virus is malicious software that attaches itself to executable files, whereas a worm is malicious software that attaches itself to an image file. There is no difference between a virus and a worm.