A computer program that self-replicates.
Virus
·
A computer program
that self-replicates.
Macro
·
Infect the macros in
MS Office products.
Multi-partite
·
Infects computers in
multiple ways, for example, the boot sector and a file.
Memory Resident
·
Virus that installs
itself in RAM and stays there from turn on to shut down.
Armored
·
Virus that uses
techniques that make it hard to analyze.
Sparse Infector
·
A virus that attempts
to avoid detection by taking actions sporadically.
Trojan Horse
·
A program that looks
benign but actually has a malicious purpose.
Buffer-Overflow Attack
·
An attack that
attempts to put more data into a buffer than it can actually hold. Works by
overflowing the buffer and pushing the virus in through the information over
the buffer limit.
Spyware
·
Software that literally
spies on your activities on a particular computer.
Rootkit
·
A collection of tools
used in order to obtain admin privileges.
Logic Bomb
·
A type of malware that
executes once a certain set of criteria have been met.
Advanced Persistent
Threats (APTs)
·
Continuous process of
attacking.
D. Program that
self-replicates
·
Which of the following
is the best definition of virus?
A. Program that causes harm on your computer
B. Program used in a DoS attack
C. Program that slows down networks
D. Program that self-replicates
A. Slowing down
networks by the virus traffic
·
What is the most
common damage caused by virus attacks?
A. Slowing down networks by the virus traffic
B. Deleting files
C. Changing the Windows Registry
D. Corrupting the operating system
B. By email attachment
·
What is the most
common way for a virus to spread?
A. By copying to shared folders
B. By email attachment
C. By FTP
D. By downloading from a website
C. It is easy to write
programs that access Outlook's inner mechanisms.
·
Which of the following
is the primary reason that Microsoft Outlook is so often a target for virus
attacks?
A. Many hackers dislike Microsoft.
B. Outlook copies virus files faster.
C. It is easy to write programs that access Outlook's inner mechanisms.
D. Outlook is more common than other email systems.
B. Mimail virus
C. Sobig virus
·
Which of the following
virus attacks used a multimodal approach?
A. Slammer virus
B. Mimail virus
C. Sobig virus
D. Bagle virus
A. It spread in multiple ways.
·
What factor about the Sobig
virus made it most intriguing to security experts?
A. It spread in multiple ways.
B. It deleted critical system files.
C. It was difficult to protect against.
D. It was very sophisticated.
B. It grabbed email addresses from documents on
the hard drive.
·
What was most
interesting to security experts about the Mimail virus?
A. It spread more rapidly than other virus attacks.
B. It spread in multiple ways.
C. It grabbed email addresses from documents on the hard drive.
D. It deleted critical system files.
A. The email containing it claimed to be from the
system administrator.
·
Which of the following
reasons most likely made the Bagle virus spread so rapidly?
A. The email containing it claimed to be from the system administrator.
B. It copied itself across the network.
C. It was a sophisticated virus.
D. It was particularly virulent.
B. It disabled antivirus software.
·
What made the Bagle
virus so dangerous?
A. It changed Windows Registry settings.
B. It disabled antivirus software.
C. It deleted key system files.
D. It corrupted the operating system.
C. Never open unknown email attachments.
·
Which of the following
is a way that any person can use to protect against virus attacks?
A. Set up a firewall.
B. Use encrypted transmissions.
C. Use secure email software.
D. Never open unknown email attachments.
. Use a code word
indicating the attachment is legitimate.
·
Which of the following
is the safest way to send and receive attachments?
A. Use a code word indicating the attachment is legitimate.
B. Only send spreadsheet attachments.
C. Use encryption.
D. Use virus scanners before opening attachments.
C. Most companies do not send alerts via email.
·
Which of the following
is true regarding emailed security alerts?
A. You must follow them.
B. Most companies do not send alerts via email.
C. You can trust attachments on security alerts.
D. Most companies send alerts via email.
A. Open a backdoor for malicious software.
·
Which of the following
is something a Trojan horse might do?
A. Open a backdoor for malicious software.
B. Change your memory configuration.
C. Change ports on your computer.
D. Alter your IP address.
D. Putting more data in a buffer than it can hold
·
What is a
buffer-overflow attack?
A. Overflowing a port with too many packets
B. Putting more email in an email system than it can hold
C. Overflowing the system
D. Putting more data in a buffer than it can hold
B. Sasser virus
·
What virus exploited
buffer overflows?
A. Sobig virus
B. Mimail virus
C. Sasser virus
D. Bagle virus
C.
Shut down all unneeded
ports.
D.
·
What can you do with a
firewall to help protect against virus attacks?
A. There is nothing you can do on the firewall to stop virus attacks.
B. Shut down all unneeded ports.
C. Close all incoming ports.
D. None of the above.
E. Spyware
·
A key logger is what type
of malware?
A. Virus
B. Buffer overflow
C. Trojan horse
D. Spyware
E. Install and use antivirus software.
·
Which of the following
is a step that all computer users should take to protect against virus attacks?
A. Purchase and configure a firewall.
B. Shut down all incoming ports.
C. Use nonstandard email clients.
D. Install and use antivirus software.
A. By comparing files against a list of known
virus profiles
·
What is the primary
way a virus scanner works?
A. By comparing files against a list of known virus profiles
B. By blocking files that copy themselves
C. By blocking all unknown files
D. By looking at files for virus-like behavior
D. By looking at files for virus-like behaviour
·
What other way can a
virus scanner work?
A. By comparing files against a list of known virus profiles
B. By blocking files that copy themselves
C. By blocking all unknown files
D. By looking at files for virus-like behavior