Each of the following is an action that a virus can take except _____.
Transport itself through the network to another device.
Li downloads a program that prints coupons, but in the background it silently collects her passwords. Li has actually downloaded a _____.
To completely remove a rootkit from a computer, you should _____.
Reformat the hard drive and reinstall the operating system.
_____ is an image spam that is divided into multiple images, and each piece of the message is divided and then layered to create a complete and legible message.
_____ is a general term used for describing software that gathers information without the user's consent.
Each of the following is true regarding a keylogger except _____?
software keyloggers are easy to detect.
The preferred method today of bot herders for command and control (C&C) of zombies it to use _____?
Hypertext Transport Protocol (HTTP). Note: used to be IRC.
Which of the following is a social engineering technique that uses flattery on a victim?
Erin pretends to be a manager from another city and calls Nick to trick him into giving her his password. What social engineering attack has Erin performed?
How can an attacker use a hoax?
A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.
Which of the following is not an item that could be retrieved through dumpster diving that would provide useful information?
Each of the following is the reason adware is scorned except _____?
It displays the attackers programming skills.