Elance Antispam and Antivirus Test Answers 2015
·
Elance
Antispam and Antivirus Test Answers 2015
Where might a spammer get your personal information from?
Facebook
MySpace
LinkedIn
All of
these
Which of the following spam filtering
techniques has the highest potential for generating false positives?
Community
Filtering
Bayesian
Filtering
Challenge-Response
Filtering
Keyword
Filtering
Why shouldn't a user click unsubscribe links
from spam messages?
clicking
the link will prevent
unsubscribing
makes finding the sender difficult
the click
may validate the email address
What is an example of a Phishing scam?
An
application that looks useful, but actually contains spyware to slow down your
computer
An email
that appears to be legitimate, but is really being used to obtain personal or
important information
Hacking
into a computer and leaving false trails on who did it
Installing
a virus and then asking you to pay to remove it
Malware is short for
Malicious
Software
Malicious
Systems
Maliant
Software
Maliant
Systems
What is a good method for a website owner to
confirm a user is not using an account for a spamming purposes?
Users
must associate a phone to their account and confirm a number sent to them via
text
Requiring
users provide valid personal information during sign up
All of
these
Users
that register must click on a confirmation link to the email they specify in
their profile
A virus is a program that attaches itself to
(or replaces the contents of) which of the following file types?
Text
files
Executables
Header
files
Source
files
In order for antivirus programs to be most effective,
it is necessary to keep which of the following up to date?
Web
browsers
File
hashes
Antivirus
encryption keys
Virus
definition files
Which of the following is not a well known
anti-virus program?
AVAST
SMAG
AVG
McAFee
What is a captcha?
A
spam email that attempts to "capture" information and then use that
information to cause damage; the second phase is often referred to as the
"gotcha" phase.
An
SPAM email written in all caps
It is a
tool websites often use to prevent automated spammer bots from posting or
registering on a website by forcing the user to do a task, often entering in
letters or numbers based on a picture or audio, which verifies that they are
human.
A
group of characters in hidden in an email that often includes code used in
malware.
What are types of malware?
Viruses
Spyware
All of
these
Worms
What could be a good indicator of a Spam
email?
Something
that sounds too good to be true
All of
these
An
email that contains plenty of grammar mistakes
An
email sent to a bunch of random people
In order to infect a system, clicking an email
attachment must cause which of the following conditions to occur?
the
attachment is saved to the disk
the
attachment is decompressed
the
attachment opens in a preview editor
the
attachment executes
If you cannot delete malware infected file,
what is good method to try first?
Reformat
then attempt to delete the file
Run
Windows Repair
Run
Windows Restore
Boot in Windows
safe mode and attempt to delete the file
Which of these is an example of a possible
victim in a phishing attack?
The
website that was hacked
The
person who had their identity stolen
All of
these
The
bank of the victim
What is a keylogger?
Software
that that records keys you set when encrypting files
Software
that records keystrokes made on a keyboard
Software
used to log all attempts to access a certain file
Software
that steals passwords or "keys" that you have saved on your computer
A virus can spread to another computer by
Sharing
an infected file with another computer
Through
touch
Pinging
other computers from the infected computer
Being
on the same network as that computer
Automated spamming tools subscribe to mail
lists in order to complete which of the following tasks?
collect
email addresses
deny
service to mail list recipients
introduce
security holes into the list
What is a computer virus?
Software
that steals files from your computer and is used by blackmailers
Spyware
that slows down a computer by sending statistics to an unknown source
A type of
malware that replicates itself and spreads to other files and/or computers.
A
software that hijacks your computer and asks you to pay in order for it to be
removed
Which of these techniques would be effective
in helping to prevent phishing attacks by scammers?
Use
IFRAME's
Allow
XSS
Scan for
and fix XSS issues
Use
Pop-ups
What run command can you use to check what
programs load on startup?
cmd
ipconfig
msconfig
startup
A client asks you to fix his computer because
it has ransomware on it. He says he sees a message as soon as he loads windows,
and cannot do anything else. What is the best way to fix this computer without
losing any of his data?
Reinstall
Windows
Reformat
the computer
Boot from
a USB drive and run a program to remove the malware
Use
Windows Restore
What is a botnet?
Software
that automates networks
A
program that sends emails repeatedly infecting other computers who open it
A
collection of malware stored in a network
A
collection of computers working together to perform a single task. These
computers are often penetrated by software containing malware.
What is rogue security software?
Security
software that has been compromised to not pick up certain threats
Security
software that is no longer being used for the purpose that was intended due to
an exploit or hacker.
A
fraudulent security program that appears to be helpful, but is actually not. It
may deceive or mislead users into paying money to remove fake viruses or
introduce malware after it is installed.
Security
software that considers data files or programs as viruses, when they are not.
What is an example of a "419" Scam
Someone
who uses social engineering to gain access to your computer or personal
information
Someone
who sends you an email in hopes you open an attachment which contains a virus
When
you download a program that appears harmless, but it actually installs spyware
on your computer
A con in
which someone asks you for assistance in retrieving a vast sum of money. Often
it involves you helping him or her pay off certain fees and in return they
promise to share the money with you.
What is the main difference between spyware
and other malware?
There
is no difference
Spyware
that slows down a computer by sending statistics to an unknown source, while
malware only includes threats from inside your own computer
Malware
monitors data usage, while spyware infects your computer with viruses
Spyware
tends to steal or monitor data and/or personal information while malware
encompasses all software that may been made with malicious intent in mind
What is a backdoor?
A
vulnerability in software that allows someone to bypass the normal
authentication process
It is
a known bug or exploit hackers use to cause software to behave in a way that
was not intended by the manufacturer
It is
where viruses store their source code and begin to replicate
It is
a way for spyware to leave a system without any trace of it being there
Which of the following sites provide services
for users to setup disposable emails?
jetable.org
gmail.com
yahoo.com
hotmail.com
Virus infection via email attachments can be
minimized using which of the following?
Opening
attachments from external hard drives
Copying
attachments to special directories before opening them
Right
clicking attachments
Deleting
mail containing attachments from unknown senders
What is an example of a captcha?
An
interactive program which have instructions that read: "Move the triangle
into the circle"
1 + 1
= ?
What
are the characters in this picture?
All of
these
You have been told by several of your friends
you have recently sent SPAM emails to them, what could be the cause of this and
what should you do?
A
spammer may have infiltrated your email provider's host and compromised your
account. You should notify your email provider.
A spammer
or bot may have gained access to your email account and sent out SPAM to all of
your contacts. You should change your password immediately.
A
spammer has gained access to your email. Unfortunately, the only thing you can
do to prevent further SPAM is to close your account and create a new email
address.
A
spammer is spoofing your email address. You should tell your friends to block
the email address.
Which is not an example of an anti-spyware
tool?
Ad-Aware
Windows
Defender
Spybot
Kazaa
Which of the following spam filtering issues
stops valid messages from being delivered?
false
positives
false
negatives
Which is most likely something that could be
considered strange account activity and may require further scrutiny on an
e-commerce site?
A
user logs in from another computer than the last login
A
user changes their email
Orders
from several user accounts are being sent to the same physical address
A
user changes their more than once password
Why are disposable email addresses useful?
It is
useful for someone who needs to give out their email or sign up to a website,
but wants to protect their real email address from SPAM.
It is
useful for spammers to create false email addresses that does not exist in
order to spoof the from email in their spam messsages.
It is
useful for spammers who want to send out a one time mass email, but never use
that same email address again
It is
useful for people who do not want their emails to be read
What is ransomware?
A
nickname for types of spyware that require a password on boot
Software
that steals files from your computer and is used by blackmailers
A
software that hijacks your computer and asks you to pay in order for it to be
removed
Viruses
that infect files and won't let you open them unless you know a certain pass
code
What is disposable email addressing?
A
practice in which a spammer sends out mass emails from a single email account,
but never logs into that account again.
Email
addresses that are not rea, but they appear on the from section of an email.
They are often used to help protect spammer's from being traced.
Someone
who creates an email for the sole purpose of sending out spam
A
practice in which you set a unique email address for sender/recipient
communication. Disposable email addresses typically forward to one or more real
email mailboxes where the owner can receive and read messages without revealing
their true email.
When a spammer forges the sender's address and
enters an invalid receiver, which of the following settings will cause the
receiving mail server to create backscatter?
Reject
messages
Drop
messages
Bounce
messages
In order to help prevent spam, a honeypot
performs which of the following functions?
acts as a
desirable mail server in order to lure spammers
delivers
suspected spam messages more slowly
traps
suspected spam messages
routes
suspected spam to special enclaves in the system
Which of the following techniques requires
posting an email address where only spammers would find it?
Tarpits
Spam
Traps
Blacklists
Antivirus programs hash files on a computer in
order to detect which of the following activities?
File
size changes
File
permissions changes
File
content changes
Performing outbound spam filtering does which
of the following for an organization?
helps
prevent whitelisting
helps
prevent blacklisting
helps
prevent spam trapping
What is CryptoLocker?
A
module of the Windows BitLocker encryption system.
A
type of encrypted Linux file system.
A type of
ransomware which encrypts user files and demands payment for the decryption
key.
A
malware class which is known for encrypting itself to avoid detection.
Which type of analysis is an antivirus program
performing when it observes a file's activities in a sandbox or decompiles a
file and analyzes its instructions?
Performance
Analysis
Heuristic
Analysis
Signature
Analysis
Which of the following tools would NOT be
useful in figuring out what spyware or viruses could be installed on a client's
computer?
WireShark
Malware
Bytes
HighjackThis
HitmanPro
How can delivering mail as text instead of
html help prevent spam?
text mail
prevents web bugs from alerting spammer that the message was opened
mail
servers won't accept html messages if they are in text mode
text
is easier to analyze for spammer information
What is email spoofing?
Copying
or forwarding emails and then editing their To and From to make it appear that
the email was originally sent to or from someone else
When
someone forges or makes it appear that a email being sent is from a particular
sender when it really is being sent by someone else.
When
someone sends an email that appears to look like a legitimate, but it is
actually not and is being used to obtain personal or important information.
Sending
an email through multiple accounts in order to make it difficult to trace back
the original email's sender address or origin
Which of the following reduces spam by
rejecting mail from a specific ip addresses?
URL
Blacklisting
DNS
Blacklisting
IMAP
Blacklisting
POP3
Blacklisting
Antivirus signatures are constructed using
with of the following?
Encryption
Algorithms
Random
Number Generators
Hashes
Cyclic
Redundancy Checks
How can you help stop spam?
All of
these
Block
certain email addresses known for sending spam
Setup
email filters based on keywords known to be in spam
Unsubscribe
from listservs
Which of the following characteristics
classify a mail message as spam?
it is
solicited and indiscriminately addressed
it is
unsolicited and indiscriminately addressed
it is
solicited and contains advertising
it is
unsolicited and contains advertising
Which of the following is true of macro
viruses?
They
depend on the operating system to propagate
They
are larger than traditional viruses
They
depend on applications to propagate
They
are written in low-level languages to avoid detection
Which of the following can prevent virus
infections?
Implementing
a firewall
Implementing
an intrusion detection system
Patching
programs and the operating system
In a compromised system, which of the
following provides the safest way to analyze it?
Live
CD/DVD
Resident
Antivirus Program
Live
USB
Is commercial SPAM legal in the United States?
Yes
because it is protected under the first amendment
Yes,
but only if it is an advertisement for a real product.
Yes, but
only if it follows the standards listed in the CAN-SPAM Act of 2003
No
Which of the following differentiates a virus
from a worm?
a
worm requires user interaction to infect a machine
a
worm can infect multiple machines
a virus
requires user interaction to infect a machine
a
virus can only infect a single machine
Which of the following spam filtering
techniques statistically analyzes mail?
Keyword
Filtering
Challenge-Response
Filtering
Community
Filtering
Bayesian
Filtering
Firewalls help to prevent which of the
following malware from propagating?
Encrypted
viruses
Worms
Polymorphic
viruses
Trojan
viruses
On a WordPress site, which is the default
service/tool to prevent spammers from posting comments?
Website
Inspector
Akismet
MailWasher
Pro
SpamAssassin
What is the difference between a worm and
virus?
A
worm does not replicate itself like a virus does, but rather moves from
computer to computer
A
virus infects files, while a worm eats them
A
worm is a virus created for a very specific purpose
Unlike a
virus, a worm does not need to attach itself to a program to spread.
Which of the following best describes a
distributed antivirus tool that consist of a scanning client and a
corresponding web service?
Client/Server
Antivirus
Internet
OS Antivirus
Cloud
Antivirus
Web
Antivirus
Most spyware is used to...
track a
user's movement on the web or display pop-up ads
steal
sensitive information on a computer in order to blackmail you
slow
down computers for the sole purpose of maliciousness
create
a backdoor
Polymorphic viruses randomly generate which of
the following items before infecting a new file?
mutation
engine
virus
body
decryption
routine
A virus can hide itself from an antivirus
software by doing which of the following?
intercepting
operating system read and write requests
replacing
an executable file with its payload
appending
itself to an executable file
compressing
itself in a zip file
Which of the following is true of a trojan
virus?
a
trojan reproduces by infecting other files
a Trojan
doesn't self-replicate
a
trojan inserts a copy of itself into another program
Which of the following sites use disposable
email addressing?
Craigslist
All
of these
Amazon
Walmart
When using greylist filtering, a message will
be considered legitimate if it does which of the following?
contains
a sender and subject line
is
not a multipart message
sends its
message more than once
sends
its message without html markup
Which is not an example of a real life virus
or worm discovered during the time period of 1980 to 2013?
iRiot
Elk
Cloner
The
Michelangelo Virus
The
ILOVEYOU Worm
In order to help prevent spam, a tarpit
performs which of the following functions?
traps
suspected spam messages
routes
suspected spam to special enclaves in the system
acts
as a desirable mail server in order to lure spammers
delivers
suspected spam messages more slowly
Subscribe to:
Posts (Atom)