Malware Scenarios (MC/Hint = 50% of answer points) | Scenarios (MC/Hint = 50% of answer points) | Strict Defenses Scenarios (MC/Hint = 50% of answer points) | More Defense Scenarios (MC/Hint = 50% of answer points) | Random/Bonus Scenarios (MC/Hint = 50% of answer points) |
---|---|---|---|---|
Worms
Which malware spreads copies of itself from computer to computer without human interaction?
A) Worms B) Viruses C) Bots/Zombies D) Adware |
Ad Blocker
Allan wants to watch anime on a website, but it has too many inappropriate ads. What can Allan use to block the ads?
A) Ad Blocker B) Adware C) Ed, Edd, and Eddy D) Meds |
DDoS
Angela fortified all her IoT devices. What is she trying to avoid?
A) Tax fraud B) Man-in-the-Middle C) DDoS D) Insecure Wi-Fi |
SQLi
Mr. Perez maneuvered code from a relational database and inoculated it into a web page that sells athletic objects. He does this to compromise the details of those who enter their data in the site. What did he use?
A) XSS B) SQLi C) A broom D) Man-in-the-Middle |
Keylogging/Spyware
Armin was on his computer. He was looking at his bank statements and logged in to his account. An attacker has noted his password as he typed it. What attack did the hacker use?
A) Social Engineering B) Keylogging/Spyware C) Bring out the colossal titan D) DNS spoofing |
Trojans
Which malware seems legitimate, but contains a harmful download? (It masquerades as a genuine program)
A) Adware B) Ransomware C) Trickware D)Trojans |
MiTM
Richard is chatting with his friend on a specific program. Him and his friend talk about how great Attack on Titan is, and are compelled to attend an anime convention. Richard insists on paying, so he sends his friend his credit card to purchase tickets. An unauthorized purchase was made on his card, but his friend didn't make it. What is this attack called?
A) Social Engineering B) Spoofing C) SSL Hijacking D) Man-in-the-Middle |
XSS
Tamim went to a legitimate website for Fortnite tips. When he went, malware was downloaded on his computer. The website was compromised. What is this called?
A) Physical Security Flaw B) XSS C) Weak Configuration/Permissions D) SQLi |
USB lock
Mario failed to put a USB lock in a server and it got physically hacked. What could he have done to stop this?
A) Get the star power B) Install the USB lock C) Beat bowser D) Monitor the network |
Bots/zombies
What is a program that only you can control and can flood servers?
A) Rootkits B) Viruses C) Bots/zombies D) Worms |
Rootkits
What is a set of software tools that allows an attacker to gain full-, usually-remote access to computer while staying undetected?
A) Keyloggers B) Rootkits C) Spyware D) Resident Virus |
Firewall
Angie wants to set up her home connection. She wants it secure and wants to use a device that can filter ongoing traffic. Which defense does this (alone)?
A) VPN B) The Quicker Picker Upper C) Firewall D) Liberty Mutual |
Zero-Day Exploit
Mr. Perez failed to update his computer software. His security information was compromised, including the very credit card he used to find products that encourage hair growth (this was definitely NOT Prabhjot). What attack instance is this?
A) Physical Security Exploit B) Zero-Day Exploit C) The Perez Shazam D) SQLi |
Joshwa
John has Wi-Fi with WPA. Joshwa has Wi-Fi with WPA2. Who's Wi-Fi is more secure?
A) Joshwa B) John |
Water damage occurred. Water's chemical formula is H2O. Hydrogen, an element of water, is a semi-conductor, hence why the parts were fried. This is known as short-circuiting.
Lelouch went on his dad's computer. He tried to turn it on, but it didn't work. He opened the computer and saw rust on the motherboard-- the circuit board was fried. He cried out in agony and, for some reason, blamed Tyler (it's always Tyler)! Please explain what caused this and the science behind it. Also, you have to give Prabhjot (yes only Prabhjot) chocolates *most important step.
|
Rainbow Table
What is a term for an attack that is used for catching the output of cryptographic hash functions?
A) Keyline B) Rainbow Table C) Redline D) Hash |
Compromised Password
Richard uses the same password for every website. He tries to sign into YouTube one day, but it wasn't working. What happened?
A) He has Ligma B) His password is compromised C) Taheem broke into his house, smirking and drooling, and took his locked laptop D) Richard didn't delete his cache, so his data has been stolen |
Weak Configuration/Permissions
Taheem has a visiting guest named Onkar. Onkar needs to use his computer for something. Taheem let him use the guest account. Onkar logged in and downloaded malware mistakenly and had access to other accounts. Is the configuration weak or strong?
A) Weak Configuration/Permissions B) It's giving bozo C) Insecure Wi-Fi D) DaBaby |
MAC spoofing
Light Yagami wanted to infiltrate a particular detective's network. He wasn't on the whitelist. What could you do to go on the network.
A) DoS B) Access Control C) Get the Death Note D) MAC spoofing |
Cryptography
What is it called when you protect information by encrypting it to a secure format?
A) Cryptography B) DDL C) Brute force D) Secure signatures |
Ransomware
Which malware locks user files and demands payment to release the compromise?
A) Ransomware B) Viruses C) Payoff D) Adware |
Social Engineering
Bessy ate too many Doritos and looked on Google to help her cure her stomach ache. She came across a site that would give her medicine. They asked her credit information, password, email, DOB, and her mother's maiden name. What is this an example of?
A) Misunderstanding of health B) Spoofing C) Social Engineering D) Virus |
Data backup
Often little-none people do this on their device manually. It is usually automatic and helps to load to a previous save.
A) Data backup B) Spoofing C) Building security D) Access control |
Human resources
Ronnie is a new employee at the CaEring company. He was provisioned security policies buy which domain of the company?
A) Senior manager B) Employee 1 C) CEO D) Human resources |
Adware
Tanjiro was on an inappropriate site and clicked on a certain ad. Afterwards, he got blooded with pop-up ads. What is this type of malware?
A) Social engineering B) Phishing C) Spyware D) Adware |