CHAPTER 10 [CMIN244]

¡Supera tus tareas y exámenes ahora con Quizwiz!

Why would you want to restrict cookies? -Cookies take up hard drive space. -Cookies consume system memory. -Any Web site can read any cookie. -Cookies are often infected with a virus.

Any Web site can read any cookie

Which is one of the most famous Trojan horses? -NetBus -Back Orifice -Dropper -Util-Linux

Back Orifice

What was the worst aspect of the Internet Explorer Trojan horse of 2003? -There was no patch for it. -The path for it had security flaws. -It corrupted the registry. -It deleted system files

The patch for it had security flaws

The filename mypic.jpg.exe is an example of a(n): -JPEG image file. -computer virus. -hidden file extension. -executable image.

hidden file extension

Which is NOT a likely symptom of a Trojan horse infection? -Passwords, usernames, or accounts change. -CD-ROM and other devices seem to work on their own. -Browser home page changes. -Clock time is incorrect.

Clock time is incorrect

Which of the following is NOT an effective means of protecting against spyware? -Block all browser cookies or limit their duration. -Block scripts, applets, and other active programming in the Web browser. -Download files and programs to a separate folder until they are verified safe. -Never download any attachment unless expecting it or certain it is safe.

Download files and programs to a separate folder until they are verified safe.

Which adware product is involved in suing anti-spyware companies? -Spybot -Gator -RedSheriff -SpySweeper

Gator

Which is probably the most frequent action of Trojan horse attacks? -Installing spyware and malware. -Searching for personal information. -Installing back doors and executing DoS attacks. -Erasing files on a computer.

Installing back doors and executing DoS attacks

What did the util-linux Trojan horse do in 1999? -It captured log on information from infected computers to send to its creator. -It prevented infected computers from accessing the Internet. -It gained access to infected computers by deleting log on restrictions. -It deleted essential operating system files from network computers.

It captured log on information from infected computers to send to its creator.

What does adware do? -It creates popup advertising directly on the user's machine. -It downloads popup advertising within the Web browser. -It prevents users from blocking online popups while browsing the Internet. -It monitors user's activities to provide targeted advertising while surfing the Internet.

It creates popup advertising directly on the user's machine.

Which of the following is the most likely reason you might wish to restrict Java applets? - Java applets can easily be modified to act as spyware. -Java applets can delete files on your hard drive. -Java applets usually contain viruses. -Java applets serve no useful purpose other than virus delivery.

Java applets can easily be modified to act as spyware.

Which remote administration tool only operates on port 20034? -Spybot -Back Orifice -Portal of Doom -NetBus

Netbus

Why is blocking pop-up ads good for security? -Pop-up ads reduce productivity -Pop-up ads can corrupt memory on your system -Pop-up ads can be a vehicle for hackers to get into your system -Pop-up ads can be a vehicle for spyware or adware to get into your system

Pop up-ads can be a vehicle for spyware or adware to get into your system.

What does Back Orifice do to a system? -Installs a virus on the infected system -Launches a DDoS at Microsoft sites -Provides a remote user complete administrative access to the machine -Deletes or corrupts Microsoft Office applications

Provides a remote user complete administrative access to the machine

Which is a product for identifying and removing spyware and adware? -Spy Sweeper -RedSheriff -Webroot -Gator

Spy Sweeper

Which of the following is an advantage of Spy Sweeper over Spyware Doctor? -Spy Sweeper has more shield options than Spyware Doctor. -Spy Sweeper is less expensive than Spyware Doctor. -Spy Sweeper is simply more effective than Spyware Doctor. -Only Spy Sweeper catches adware as well as spyware.

Spy Sweeper has more shield options than Spyware Doctor.

What is RedSheriff? -Adware that is downloaded automatically when you visit certain Web sites. -Adware that is often attached to free programs found on the Internet. -Spyware that gathers information about you when you visit a web site -Spyware that gets banking information from your hard drive

Spyware that gathers information about you when you visit a web site.

What is the best approach to preventing systems from being exploited by a Trojan horse? -Software scanners. -Technological and policy measures. -High security firewalls. -Anti-spam software.

Technological and policy measures.

What is the purpose of spyware? -To monitor a system, gather information, and make it available to another. -To manage popups and prevent nuisance advertising. -To monitor a system, gain access to log on information, and allow access to from the outside. -To prevent others from detecting the presence of your computer on the network.

To monitor a system, gather information, and make it available to another.

NetBus, Back Orifice and most similar Trojan horses are removed from an infected computer system by: -scanning the system with an antivirus scanner. -installing a personal firewall. -editing the registry. -scanning the system with anti-spyware software.

editing the registry


Conjuntos de estudio relacionados

Direct Variation Quick Check - Algebra 2A U3L2

View Set

Proving a Quadrilateral Is a Parallelogram

View Set

Biology 101 Exam #2 (Mitosis/Meiosis, CH8)

View Set

Disorders of Musculoskeletal Function: Developmental and Metabolic Disorders

View Set

Female Reproductive System #14-38

View Set