Practice Test 1 – Solution
1. A polymorphic virus mutates as it replicates, therefore, the hash value will keep changing.
2. A backdoor is put into an application by a programmer so that if the user locks themselves out, they can gain access to the application. A backdoor attack is where they use this password that has been in place since the application was created.
3. The attack here is launched by telephone; therefore, it is a vishing attack.
4. Letting a fireman into your server room is a social engineering urgency attack; if you don't let him in, your building could burn down.
5. This is a disguised ransomware attack; you are parting with money to purchase the full version of the product.
6. A Remote Access Trojan (RAT) sends passwords to the hacker who then uses them to access your computer system.
7. A zero‐day virus can only be detected by using baselines. Day zero is when it is launched and it...