CJUS 3340 Ch. 7 Quiz
Worm
A piece of software that copies itself. This does not always require user intervention to spread. This type of threat does not attach itself to, or modify, other files. The name of this threat was taken from the book Shockwave Rider.
Which of the following is a trigger for a virus?
ALL OF THE ABOVE---Opening an e-mail attachment, Downloading a peer-to-peer file, and Self-execution on a certain date.
________ manifest(s) in several ways, including changes to the browser, redirecting startup pages on Internet browsers, replacing the search function within the browser, and generating pop-up ads and frames that can be difficult to delete or shut down.
Adware
Malicious code attacks that combine elements of worms, Trojans, and viruses are known as:
Blended threats
________ viruses operate based on algorithms of starting an operating system upon power on or reboot.
Boot
________ can reach very large sizes and may include thousands of machines.
Botnets
The first vastly spread virus was called "________."
Brain
Some researchers use the term ________ as a reference to the programs and tools that facilitate fraud and computer attacks.
Crimeware
A ________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server.
Denial-of-Service attack
A worm cannot spread without active intervention by the user.
False
Adware typically takes advantage of the fact that many software users do not read the end user license agreement (EULA) or the fine print during installation.
False
Apple computers are immune to viruses.
False
Boot viruses do not change infected files, but instead close the target file so that when run they "force" the OS to execute their code.
False
The main operating principle of a macrovirus is its capability to transfer its code to a remote service or workstation on its own.
False
The motives for many writers of malicious software have changed from profit to curiosity and revenge.
False
There is a central database that collects information on the damage that viruses cause.
False
Viruses are always written for criminal purposes.
False
Viruses of today are easy to detect as compared to early viruses.
False
Viruses operate in four primary environments: file viruses, boot viruses, microviruses, and network viruses.
False
Which of the following is NOT a way that viruses and other types of malicious code are primarily and currently spread?
Floppy disks
According to the Sans Institute, the number-one cyber threat is:
Increasingly sophisticated website attacks that exploit browser vulnerabilities
Which of the following is NOT a characteristic of spyware?
Internet users are rarely warned about spyware in EULAs
The unique feature of a worm is that it infects the memory of a computer and:
Is self-replicating
The greatest cost of a virus or malicious code attack is:
Loss of work hours and time spent patching systems
Which of the following is NOT one of the four primary environments viruses operate in?
Microviruses
The first known Internet worm was the ________ worm.
Morris
________ is the part of the virus program that delivers the malicious intent or other device.
Payload
According to the Symantec Internet Security Threat Report, system compromises and resulting data breaches were most likely the result of:
Phishing attacks
A ________ has no constant section of code.
Polymorphic virus
Which of the following type of Trojan horse turns a victim's computer into a zombie server available to the whole world or to the attacker only?
Proxy/Wingate Trojans
The largest group of attackers, comprising over 95% of the attacker population, is referred to as:
Script kiddies
Which of the following is NOT a type of Trojan horse discussed in the text?
Spyware Trojans
A virus can be categorized based on:
The type of environment it operates in
Virus
These operate in four primary environments. One form of this threat takes advantage of macro- languages built into common systems of business software. This type of threat operates based on the algorithm of starting an operating system upon power or reboot.
Trojan horse
This does not replicate nor copy itself. One form of this threat logs the keystrokes of the victim, allowing the attacker to search for passwords in the log file. A well-known form of this threat is named Sub7.
An unauthorized program typically contained within a legitimate program is known as a:
Trojan
A ________ is a program that neither replicates nor copies itself, but causes damage or compromises the security of the computer.
Trojan horse
Attack tools are increasingly being distributed through "zombie" machines that are compromised on university campuses.
True
Reports have shown that there were billions of cyber-attacks against U.S. interests in 2017.
True
The Sub Seven Trojan allows a remote attack virtual control over an infected machine.
True
Viruses and malicious code are graded based on the potential damage they can cause and their overall impact on computer operations at the individual level and across the world.
True
Viruses are operating system and software system specific.
True
Macro viruses are most commonly associated with:
Typical business software applications
Which of the following is true?
Virus hoaxes waste your time and cause fear
A ________ program enables an attacker to compromise and infect multiple computers at once.
bot
Spyware can be installed through ________, which are files that contain information about a program, a website, the user, or the user's computer.
cookies
Computer systems and software are graded in terms of their ________ to vulnerabilities.
exposure
The most common term used to describe how a virus is operating and the effect it is having is listing the virus as "in the wild", and the ________ of a virus measures the extent to which the virus is spreading among the computer users and systems.
wildness