Quiz 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

According to information provided by Panda Security (2013), what is the approximate average strains of malware identified each day? a) 2,000 b) 8,000 c) 28,000 d) 82,000

82,000 (D)

Instead of the terms virus or malware, states usually use what term to identify software designed to damage, destroy, or transmit information within a system without the permission of the owner? a) Vulnerabilities b) Information Communication Technologies c) Trojan d) Computer Contaminants

Computer Contaninants (D)

(T/F) "Laptops and desktop computers are the only form of electronic device that can be infected by malware or Trojans."

False

What term is a general term used to encapsulate the range of destructive programs that can be used to harm computer systems, gain access to sensitive information, or engage in different forms of cybercrime? a) Trojan b) Microsoft Windows c) Virus d) Malware

Malware (D)

What form of blended threat refers to threats that demand that the operator of the infected system to pay in order to have their system's functionality restored? a) Scareware b) Trojans c) Ransomware d) Both b & c

Ransomware (C)

Malicious software programs operate by exploiting ___________ in computer software or hardware. a) Passwords b) Glitches c) Users d) Vulnerabilities

Vulnerabilites (D)

Some estimates place the total cost of hacks on the world economy over the past decade at how much money per year? a) $1 million b) $100 million c) $1 billion d) $1 trillion

$1 trillion (D)

According to F-Secure (2013), approximately how many new strains of malware were identified in the first nine months of 2013? a) 3 million b) 10 million c) 13 million d) 23 million

10 million (B)

The Morris worm helped lead to the formation of what foundation to better serve as a coordinating point for responses to major network emergencies? a) Computer Emergency Response Team (CERT) b) Anonymous c) Computer Security Incident Response Team (CSIRT) d) The Legion of Doom

Computer Emergency Response Team (A)

Which of the following is NOT one of the three factors identified by Holt (2013) that affect the practices of market actors? a) Trust b) Customer Service c) Price d) Customer Satisfaction

Customer Satisfaction (D)

What term is defined as a piece of code that can take advantage of vulnerabilities to give the attacker deeper access to a system or network? a) Hack b) Glitches c) Vulnerabilities d) Exploit

Exploit (D)

(T/F) "Numerous nations have criminalized the creation of malware due to the substantial harm that it can pose."

False

Which of the following is NOT one of the five primary reasons the dissemination of malware across computer networks can be costly? a) The loss of data and copyrighted information b) Loss of pride in knowing how to work a computer c) Loss of revenue due to customer apprehension about the safety of a company's website d) Identity theft

Loss of pride in knowing how to work a computer (B)

What form of malware is similar to viruses in that it cannot replicate on its own, but requires some user interaction in order to execute the code? a) Viruses b) Vulnerabilities c) Trojans d) Worms

Trojans (C)

(T/F) "In addition to viruses, Trojans, and worms, there are now blended threats operating online that combine the distinct aspects of these codes into a single functional tool."

True

(T/F) "Malware can disrupt network operations, delete, steal, or manipulate files, allow access to confidential files, and generally damage computer systems and hardware."

True

(T/F) "Malware exists in a nebulous legal space as there are no specific laws against the creation of malicious software."

True

(T/F) "The threat of malware is diverse and ever-changing, affecting virtually all forms of computer technology. As such, law enforcement agencies are not necessarily able to mitigate the threat of malware."

True

Which of the following forms of malicious software is arguably the oldest form of malware that exists? a) Worms b) Viruses c) Trojans d) Vulnerabilities

Viruses (B)

What form of malware is a unique form that can autonomously spread on their own, though they do not necessarily have a payload, by utilizing system memory to spread, self-replicate, and deteriorate system functionality? a) Vulnerabilities b) Worms c) Viruses d) Trojans

Worms (B)


Conjuntos de estudio relacionados

Chapter 40: Musculoskeletal Care Modalities

View Set

Chapter 2: Basic Concepts and Processes PrepU

View Set

Peds Exam 3 (Onc/Heme, GI, GU, Endo)

View Set

Lippincott the child with cardio health problems

View Set

AP Macroeconomics Semester 2 FINALS

View Set

Workers Compensation and Employers Liability Insurance

View Set