A computer program that self-replicates.

  A computer program that self-replicates.


Virus

 

·         A computer program that self-replicates.

 

Macro

 

·         Infect the macros in MS Office products.

 

Multi-partite

 

·         Infects computers in multiple ways, for example, the boot sector and a file.

 

Memory Resident

 

·         Virus that installs itself in RAM and stays there from turn on to shut down.

 

Armored

 

·         Virus that uses techniques that make it hard to analyze.

 

Sparse Infector

 

·         A virus that attempts to avoid detection by taking actions sporadically.

 

Trojan Horse

 

·         A program that looks benign but actually has a malicious purpose.

 

 

Buffer-Overflow Attack

 

·         An attack that attempts to put more data into a buffer than it can actually hold. Works by overflowing the buffer and pushing the virus in through the information over the buffer limit.

 

Spyware

 

·         Software that literally spies on your activities on a particular computer.

 

Rootkit

 

·         A collection of tools used in order to obtain admin privileges.

 

Logic Bomb

 

·         A type of malware that executes once a certain set of criteria have been met.

 

Advanced Persistent Threats (APTs)

 

·         Continuous process of attacking.

 

D. Program that self-replicates

 

·         Which of the following is the best definition of virus?
A. Program that causes harm on your computer
B. Program used in a DoS attack
C. Program that slows down networks
D. Program that self-replicates

 

A. Slowing down networks by the virus traffic

 

·         What is the most common damage caused by virus attacks?
A. Slowing down networks by the virus traffic
B. Deleting files
C. Changing the Windows Registry
D. Corrupting the operating system

 

B. By email attachment

 

·         What is the most common way for a virus to spread?
A. By copying to shared folders
B. By email attachment
C. By FTP
D. By downloading from a website

 

C. It is easy to write programs that access Outlook's inner mechanisms.

 

·         Which of the following is the primary reason that Microsoft Outlook is so often a target for virus attacks?
A. Many hackers dislike Microsoft.
B. Outlook copies virus files faster.
C. It is easy to write programs that access Outlook's inner mechanisms.
D. Outlook is more common than other email systems.

 

B. Mimail virus
C. Sobig virus

 

·         Which of the following virus attacks used a multimodal approach?
A. Slammer virus
B. Mimail virus
C. Sobig virus
D. Bagle virus

 

A.   It spread in multiple ways.

 

·         What factor about the Sobig virus made it most intriguing to security experts?
A. It spread in multiple ways.
B. It deleted critical system files.
C. It was difficult to protect against.
D. It was very sophisticated.

 

B.   It grabbed email addresses from documents on the hard drive.

 

·         What was most interesting to security experts about the Mimail virus?
A. It spread more rapidly than other virus attacks.
B. It spread in multiple ways.
C. It grabbed email addresses from documents on the hard drive.
D. It deleted critical system files.

 

A.   The email containing it claimed to be from the system administrator.

 

·         Which of the following reasons most likely made the Bagle virus spread so rapidly?
A. The email containing it claimed to be from the system administrator.
B. It copied itself across the network.
C. It was a sophisticated virus.
D. It was particularly virulent.

 

B.   It disabled antivirus software.

 

·         What made the Bagle virus so dangerous?
A. It changed Windows Registry settings.
B. It disabled antivirus software.
C. It deleted key system files.
D. It corrupted the operating system.

 

C.   Never open unknown email attachments.

 

·         Which of the following is a way that any person can use to protect against virus attacks?
A. Set up a firewall.
B. Use encrypted transmissions.
C. Use secure email software.
D. Never open unknown email attachments.

 

 

. Use a code word indicating the attachment is legitimate.

 

·         Which of the following is the safest way to send and receive attachments?
A. Use a code word indicating the attachment is legitimate.
B. Only send spreadsheet attachments.
C. Use encryption.
D. Use virus scanners before opening attachments.

 

C.   Most companies do not send alerts via email.

 

·         Which of the following is true regarding emailed security alerts?
A. You must follow them.
B. Most companies do not send alerts via email.
C. You can trust attachments on security alerts.
D. Most companies send alerts via email.

 

A.   Open a backdoor for malicious software.

 

·         Which of the following is something a Trojan horse might do?
A. Open a backdoor for malicious software.
B. Change your memory configuration.
C. Change ports on your computer.
D. Alter your IP address.

 

D.   Putting more data in a buffer than it can hold

 

·         What is a buffer-overflow attack?
A. Overflowing a port with too many packets
B. Putting more email in an email system than it can hold
C. Overflowing the system
D. Putting more data in a buffer than it can hold

 

B.   Sasser virus

 

·         What virus exploited buffer overflows?
A. Sobig virus
B. Mimail virus
C. Sasser virus
D. Bagle virus

 

C.   Shut down all unneeded ports.

D.  

·         What can you do with a firewall to help protect against virus attacks?
A. There is nothing you can do on the firewall to stop virus attacks.
B. Shut down all unneeded ports.
C. Close all incoming ports.
D. None of the above.

 

E.   Spyware

 

·         A key logger is what type of malware?
A. Virus
B. Buffer overflow
C. Trojan horse
D. Spyware

 

E.   Install and use antivirus software.

 

·         Which of the following is a step that all computer users should take to protect against virus attacks?
A. Purchase and configure a firewall.
B. Shut down all incoming ports.
C. Use nonstandard email clients.
D. Install and use antivirus software.

 

A.   By comparing files against a list of known virus profiles

 

·         What is the primary way a virus scanner works?
A. By comparing files against a list of known virus profiles
B. By blocking files that copy themselves
C. By blocking all unknown files
D. By looking at files for virus-like behavior

 

D.   By looking at files for virus-like behaviour

 

·         What other way can a virus scanner work?
A. By comparing files against a list of known virus profiles
B. By blocking files that copy themselves
C. By blocking all unknown files
D. By looking at files for virus-like behavior

 

Answer Detail

Get This Answer

Invite Tutor