Chapter 3 - Computer Security (Q&A)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Botnets are composed of _____.

Zombies

Each of the following is the reason why adware is scorned, except _______. a) it displays objectionable content b) it can interfere with a user's productivity c) it displays the attackers programming skills d) it can cause a computer to crash or slow down

c) it displays the attackers programming skills

A _____ is a downloadable image that can be used to scan a computer for malware.

rescue disc

The database that contains the sequence of characters of a virus is called the _____.

signature file

Which of the following is not a type of malware that has as its primary trait circulation and/or infection?

Botnet

Which statement regarding a keylogger is NOT true? a) Software keyloggers are easy to detect. b) Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port. c) Keyloggers can be used to capture passwords, credit card numbers, or personal information. d) Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

a) Software keyloggers are easy to detect.

Malware payload allows an attacker to execute virtually any command on the victim's computer this is called _____.

arbitrary code execution

Which of these could NOT be defined as a logic bomb? a) If the company's stock price drops below $10, then credit Jeff Brown with 10 additional years of retirement credit. b) Send spam email to all users in the company. c) Erase all data if John Smith's name is removed from the list of employees. d) Reformat the hard drive three months after Susan Jones left the company.

b) Send spam email to all users in the company.

Each of the following is a typical feature of a fee-based Internet backup service except____________.

backup to an external hard drive

Which of the following enhancements to software provides new or expanded functionality but does not address security vulnerabilities?

feature update

Which of these is NOT an action that a virus can take?

transport itself through the network to another device

How many carriers must a virus have to replicate and attack?

two

A(n) _____ requires a user to transport it from one computer to another.

virus

Which of these is a general term used for describing software that gathers information without the user's consent?

Spyware

Each of the following is a question that the user should ask regarding data backups except _____.

Who should do the backup?

Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency?

ransomware

What is access a computer, program, or service that circumvents any normal security protections called?

Backdoor

Which level of UAC provides the lowest level of security?

Never notify

A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a _____.

Trojan


Conjuntos de estudio relacionados

A People and a Nation. Chapters 4, 5, 6, 7

View Set

Chapter 17: Postpartum Physiologic Adaptations

View Set

Chapter 23 - High Renaissance & Mannerism

View Set

PNE 103. Ch 66 - Caring for Clients with Burns. Intro Medical-Surgical Nursing. Timby/Smith 12th. Ed.

View Set

110 - Ch 1-11 + 46 +47 Test 1 - Questions - Basic Pharmacology For PN - TCR Fall 2017 not finished

View Set

SUICIDE: PREVENTION AND INTERVENTION

View Set

Network Pro Ch 9.2, Network+ Domain 4: Troubleshooting, part 3 network exam, 10.7.9 Practice exam, CompTIA Network+ Certification, CompTIA Network+ Certification Practice Test 1, CompTIA Network+ Certification Practice Test 3, CompTIA Network+ Certif...

View Set