Computer worms and viruses
Imprisonment time for a computer virus can range from 0 to __________.
20 years
The first virus created in 1982 was the ______________ virus.
Elk Cloner
Which of the following is true about a worm?
It moves or copies itself to a computer without the user's knowledge.
Which of the following is the act of a computer virus attaching itself to another computer program?
Piggybacking
Which of the following is NOT a similarity between a worm and virus?
They both use host programs to replicate.
Which of the following is also referred to as malware?
computer virus
Computer files generally back themselves up automatically, so there is no need to frequently back up important files.
false
Free anti-virus software on the Internet will protect a user's computer as well as a paid program.
false
There are two types of computer worms: a network worm and a __________.
host worm
A Trojan horse will possibly __________.
monitor browsing activity and keystrokes
Which of the following is a computer worm which copies different segments of itself to computers linked together in a network?
network worm
A virus which, if anyone attempted to view an infected sector, would replace it with the clean, original version of the sector is known as a ___________________
stealth virus
Viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list.
true
A computer __________ is a malicious, self-replicating independent program, but a computer __________ is a malicious program requiring a host program to replicate.
worm; virus
A Trojan horse will generally attempt to gain access to which type of area on a computer?
administrative