Answer the question
In order to leave comments, you need to log in
Can anyone share answers to DrWeb tests?
Looking for answers to DrWeb tests. Maybe someone has?
I share my answers to DrWeb tests.
How much does Trojan.Encoder ask Russian users for decrypting files? - from 1,000 to 6,000 rubles. - Yes
How do victims most often pay for "services" of decryption to the author of Trojan.Encoder in Russia? - using mobile payment systems - Yes
How did the Trojan.Encoder.94 malware differ from encoders of other versions? - This ransomware version was the first to extort money from victims in English. - Yes
Living in Spain (namely, where the author of Trojan.Encoder still lives) costs money. How does the author of this Trojan monetize his criminal proceeds in Europe? Victims pay for decrypting files: - several - using Ukash, Paysafecard systems; credit cards - yes
How do ransomware Trojans intimidate gullible users into paying money? - The attackers report that it is impossible to decrypt files encrypted with the Trojan, and the victim will lose valuable information. - Yes
Valid email addresses of social network users are a commodity that is in demand among spammers and is generously paid for. Which of the following tricks are often used by spammers to find out the login details of Facebook users? - Emails informing you that your Facebook account has been blocked. - Yes
In October 2012, Hungarian hacker Zoltan Balazs reported a backdoor in the form of a browser extension. He created it to draw attention to the problem of a huge number of such malicious extensions. What dangerous browser plug-ins, according to him, are created most often now? - To spam Facebook. - Yes
Attackers have found a new way to hack Facebook profiles - using malicious browser extensions (plugins) that gain unauthorized access to social network user accounts. Can such plugins function without launching a browser? - No, because their capabilities are limited by the functionality of the plugin. - Yes
How does the new threat to Facebook, distributed as an update for Adobe Flash, intimidate users? - Deleting a social network account. - Yes
Attackers have come up with a way to put real information from the social network user profile: avatar, first name, last name and number of friends in pop-up banners (for example, about blocking the social network account VKontakte and Facebook) on phishing pages. Are user accounts hacked? - No, the created phishing page partially overlaps the authorization forms. - Yes
The younger generation is defenseless against the information flows that fall on it on the net. Modern antivirus tools allow you to protect children from inappropriate content. What categories of websites are filtered by Dr.Web Parental Control? - several -
Gambling
Social networks
Weapons
Obscene language
Sites for adults - Yes
In Dr.Web Security Space you can create your own lists of sites, they are marked with different colors depending on the degree of danger. What kind of lists are there in Parental Control? - White and black lists. - Yes
Is it possible for children to bypass Dr.Web Parental Control restrictions? - Yes, if the child finds a way to log into Windows under an account with administrator rights. - Yes
"Adult" content (movies, photos) can be stored on the parents' computer. Is it possible to block access to a separate folder, file or usb device using Dr.Web Parental Control to protect your child from unnecessary information? - Yes, there is. This is set in the settings of the Parental Control component. - Yes
What method of protecting children from accidental access to “adult sites” has been taken by the state structures of Russia? - The law “On the protection of children from information harmful to their health and development” was adopted, according to which the owners of such sites carry out their labeling. - Yes
Not all malware is written by unknown (to the police) virus writers. Many of them have official authors - legal companies. Why are the police in no hurry to prosecute these companies for writing malicious applications? - These are developments ordered by the state special services. - Yes,
Mercenaries are called citizens of foreign states, which another state attracts to participate in hostilities. Why are some companies that develop software for tracking purposes dubbed "mercenaries of the digital age"? The software developed by these companies
is malicious and, in fact, is a cyber weapon
used by the authorities of repressive countries - Yes
For what purposes is the software developed by the "mercenaries of the digital age" used by the authorities of repressive states? -
to restrict freedom of speech and information in order to intercept information for the purpose of its subsequent
use
as evidence of the citizen's guilt
in order to spy on users - Yes
). This malicious application was developed by the British company Gamma Group, which specializes in creating software for IT forensics and investigations. What spy functions does this Trojan have? -
He knows how to turn on webcams and microphones.
It can intercept keyboard keystrokes
It is capable of intercepting Skype messages.
It can take screenshots - Yes
Today, there are a lot of spy Trojans for Windows, but are there such programs for the Android mobile platform? - Yes, for Android there are spyware designed to spy on the user (for example, Android.MobileSPy, Android.Mobistealth, Android.Flexispy, if they are Trojans, then Android.EmailSpy, Android.SmsSpy), and Trojans with the same malicious functionality. - Yes
Why use Safely Remove Hardware? - Safe removal of the device ensures the safety of data and the drive itself, which may suffer from a "rough" shutdown by simply removing the media from the slot. - Yes
To reduce the risk of viruses from external storage media (flash drives) entering the computer, it is recommended: - Disable autorun of removable media. - Yes
Why is there a reduction in space on the flash drive compared to the original (measured immediately after purchase)? - When using a flash drive, its sectors wear out. Its device provides a system for isolating these sectors to ensure that there is no loss of information. Thus, after the next formatting, you can notice that the volume of the drive has decreased somewhat. - Yes
The appearance on the flash drive without your knowledge of the RECYCLER, System Volume Information folders indicates that ... - Under certain conditions, the operating system can also create such folders. But also their appearance can be caused by the activity of the virus. It is necessary to disinfect the flash drive and all computers on which it was used. - Yes
Folders on a flash drive can be displayed in a modified form (for example, when using standard Windows XP skins, folder icons look like in Windows 7/Vista, or an .exe extension is added to the folder name. What is the reason? - It says that a Trojan has settled on the flash drive.In no case should you click on these modified folders.The drive needs to be scanned by an antivirus.-Yes
What is cryptography? - The science of the theory and practice of encryption. - Yes
What does the particle “crypto” mean in the word cryptography? - Secret, secretive - Yes
In what case can a cryptographic (encryption) program be called malicious? - If without the knowledge and consent of the user, the program encrypted his documents, photos or other files. - Yes
One of the most famous malicious encryption programs today is Trojan.Encoder. What types of files can be encrypted by Trojans of this family? -
music
photos
video
documents - yes
Malicious programs of the Trojan.Encoder family are characterized by the following behavior on the computer: - they encrypt user files on the infected computer and then demand money for their decryption - Yes
Answer the question
In order to leave comments, you need to log in
What gender are the most common internet scammers? - Male - Yes
How old is the average Internet scammer? - From 21 to 35 years old - Yes
When and where does an Internet scammer most often engage in his unseemly business? - Surprisingly, most often these people have legal jobs, and they are engaged in fraud at home, in their free time. For them, cheating people is just an additional income, a part-time job. - Yes
What abilities and inclinations should a successful Internet scammer have? -
The desire to learn new technologies and keep abreast of events
Caution
The ability to notice, study and exploit human mistakes (one's own and other people's)
Creativity
Imagination - Yes
Internet scammers are creative people. What legal profession can be compared to the "profession" of an Internet scammer? - All of the above - Yes
Every transaction, even a fraudulent one, has two sides - one side wants to deceive someone, the other side - a potential victim - is ready to be deceived. What personal characteristics of people are exploited by Internet scammers? - All of the above, and scammers play on what is more expressed in a person - a potential victim. - Yes
There is a Pirate Party in Russia, which is a member of the Pirate International. According to her views: -
Russia should have direct e-democracy and the principle of free non-commercial exchange of information in any form, in any environment, on any medium.
You can't make money by distributing something illegally. The Pirate Party does not approve of the activities of manufacturers and sellers of counterfeit products, unlicensed discs, books, bypassing the agreement with the author. - Yes
According to the views of members of the Pirate Party - Authors of works should be rewarded, but not their owners and distributors. - Yes Is
piracy a unique Russian feature? - No, the level of piracy depends only on the level of opposition to it. In the United States, the level of piracy is about 20%, while in Russia it exceeds 80% - Yes
An increase in the number of pirated anti-virus programs used leads to: -
To an increase in the number of infected computers: unlicensed programs, as a rule, are not updated and therefore contain a large number of vulnerabilities, being a tasty morsel for intruders.
To increase the cost of programs for legal users - with their purchases, they must pay the cost of development and release. -Yes
Widespread availability of pirated versions of anti-virus programs -
Violates the moral principles of society.
Undermines the economy.
Reduces the number of people who could do programming - our children learn to develop programs, but pirates deprive them of this future. - Yes
What does the word "dissident" mean in Latin? - A person who disagrees with something, most often with the policy of the authorities of the country of residence. - Yes
In what countries can online dissidents face real prison terms for spreading uncensored information online? -
Bahrain
China
Syria
Iran - Yes
How many cyber activists (as of the date of this test) are currently incarcerated due to their online information activities? - About 180 people - Yes
How does the state control the Internet activities of dissidents with the help of malicious programs, in particular Trojans? -
Mobile phones are
tapped Traffic is monitored (places visited by the dissident)
Skype conversations are
tapped Hacker attacks
are carried out Passwords are cracked
The contents of the user's e-mail boxes are destroyed - Yes
Which international organization searches for "enemies of the Internet" - monitors freedom of speech on the Internet and, on the basis of the violations identified, from its point of view, declares countries that tightly control their Internet space as "enemies of the Internet"? - Reporters Without Borders - Yes
To fight for freedom of speech on the Web, an international day against censorship on the Internet was established. What is considered internet censorship? -
Persecution of citizens for free speech on the Web
Blocking access to objectionable Internet sites
Adoption of laws regulating or restricting freedom of speech on the Internet
Control of the Internet space by the state
Preventive censorship and filtering of Internet content - Yes
If you need to destroy the information that you wrote on paper, it is most reliable: - use a shredder with a degree of grinding corresponding to the degree of importance of the information -
Yes minotaur"; - Yes
If you want to destroy data recorded on a CD/DVD, you should: - crush the disc to a grain size of a quarter of a millimeter or burn it to a state of white ash - Yes
Reliable erasure of information from a hard disk or removable media is achieved by:
To erase data on a hard disk in accordance with the standard in force in Russia, you need to: - perform two write cycles (the first cycle - write all "0", the second cycle - write pseudo-random numbers)) - Yes
Reliable deletion of information from the hard disk is achieved
: device or its burning by
demagnetization or magnetization - by placing it in a slowly decreasing or increasing powerful magnetic field - Yes
If you need to erase information from a mobile device (phone, PDA ...), then you must: to default settings - yes
If you need to securely destroy information that was previously recorded on a mobile device (phone, PDA ...), you must: - destroy the device in a shredder or melt it - Yes
A student from Voronezh was convicted under article 273 (part 1) of the Criminal Code of the Russian Federation for creating and distributing huge (more than 4,000 copies) virus databases, as well as the spread of the Chernobyl virus. What was the punishment for the "collector"? - 2 years suspended sentence, because the "collector" was lucky: he did not have time to destroy someone's computers before being caught. - Yes
What was the punishment for a resident of the Philippines who created the devastating ILOVEYOU virus, which was included in the Guinness Book of Records as the one that caused the greatest damage to the global economy? - None, because at that time there was no relevant law in the legislation of the Philippines prohibiting the creation and distribution of viruses. - Yes
American Sanford Wallace was fined $711 million in 2009. Moreover, this was not the first multi-million dollar fine imposed on Wallace for the same offenses. What kind of cybercrime was it, for the sake of which it was worth incurring such losses? - Bulk spamming was the source of Wallace's fortune. - Yes
One of the world's first viruses, Brain, was written by brothers from Pakistan. They did not pursue evil goals and with the help of the virus were only going to fight the unlicensed distribution of their software, but still caused considerable harm. How did you manage to find the authors of this virus? -
They didn't hide: their names, address and phone numbers were written in the message displayed by the virus itself. - Yes
The Mydoom mail worm, also known as Novarg, carried out a massive DDoS attack on Microsoft and SCO Group websites in 2004. In response, attempts were made to catch the creators of the virus, which to this day have not been successful. What do affected companies offer for information that will help catch the attacker(s)? - The amount of 250,000 dollars. - Yes
In honor of the first of April, it is worth remembering the funny cases associated with virus attacks. In addition, attackers often display a sense of humor when writing malicious programs, which is why Doctor Web's virus analysts laughed more than once when analyzing their creations. What phrases were actually present in the malware code? - "Phe3tic Medvedic!", "I need your clothes, your boots, and your motorcycle", "I don't need your interest in." - Yes
What text was shown on the screen to users whose devices were infected with Android.DontSteal.1? - "I'm stupid and cheap, it costed only 1 buck. Don't steal like I did!" - Yes
Which of the following texts of the Trojan.Winlock malware made Doctor Web experts laugh? - “Attention! Your computer is completely locked, restarting your computer is useless. To unblock, send us a small capetal in the amount of only 400 rubles, the stronghold is received through Yandex money to our cough number ... ”- Yes
What nationality were the developers of the Trojan.Fakealert (false antivirus) malware if they used the XPEHBAM.CN website for their own purposes? - Russian developers. - Yes
Rinbot.B malware is called "the best journalist". What did she do to deserve this title? - Its code contains an alleged interview of a CNN journalist with its creator, which explains why this worm was written. - Yes
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question