CompTIA Security+ 1.1 Threats, Attacks and Vulnerabilities – Malware Types

Posted by:

|

On:

|

Malware Types

1 / 13

A network administrator notices unusual outbound traffic from several workstations. the traffic is high, even during non-working hours. What type of malware is most likely causing this issue?

2 / 13

A company detects unauthorized attempts to access confidential files. Further investigation reveals the presence of software that captures screenshots, logs keystrokes, and sends this data to an unknown external server. What type of malware is likely involved?

3 / 13

A user reports that their computer is running slow and displays numerous pop-up ads, even when not connected to the internet. The user also mentions that their default homepage and search engine have changed without their consent. Which type of malware is most likely causing these symptoms?

4 / 13

A critical server crashes every Friday at exactly 6 PM. An investigation reveals a specific script that runs at that time, which triggers the crash. No other files seem to be affected. What type of malware is most likely causing this behavior?

5 / 13

An organization’s finance department reports that files have been encrypted and renamed with unusual extensions. A text file in each directory demands a ransom in cryptocurrency for file decryption. The IT team confirms the absence of recent backups and employees are unsure how the infection started. What type of malware is most likely responsible for this situation?

6 / 13

During a routine security audit, an IT technician finds that several user accounts have been compromised. The attacker used these accounts to install malware that logs keystrokes and sends the data to an external server. Which type of malware is being used by the attacker?

7 / 13

An IT security team finds an unusual executable file on multiple systems that, when analyzed, reveals it disguises itself as a legitimate software update. Once executed, it creates a backdoor. Which type of malware does this describe?

8 / 13

An employee’s computer is exhibiting odd behavior, such as the cursor moving on its own and files being opened or deleted. The IT department discovers that an unauthorized remote access tool was installed without the user’s knowledge. What type of malware has likely been installed on the computer?

9 / 13

A network administrator notices increased web server requests from different IP addresses, all following a similar pattern. These requests involve filling out forms with random data and clicking links typically accessed by genuine users. Which type of malware is most likely responsible for this activity?

10 / 13

A network scan reveals a significant amount of unusual traffic between internal systems, and it appears that each system is attempting to exploit vulnerabilities in neighboring systems. What type of malware is most likely causing this activity?

11 / 13

Your company has experienced a sudden increase in spam emails with unusual attachments. Employees report that some files have been encrypted and are now inaccessible without a password. A ransom note demanding payment in cryptocurrency appears on affected systems. Which type of malware is most likely responsible for this situation?

12 / 13

An IT team detects unauthorized access to the network via a hidden account with elevated privileges created by malware. Which type of malware is this?

13 / 13

After a recent system update, an organization notices that critical system files have been altered and hidden from standard detection tools. The IT team finds that a specific malware is providing persistent root-level access to attackers. Which type of malware is responsible for this activity?

Your score is

Exit