Computer worms and viruses

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Imprisonment time for a computer virus can range from 0 to __________.

20 years

The first virus created in 1982 was the ______________ virus.

Elk Cloner

Which of the following is true about a worm?

It moves or copies itself to a computer without the user's knowledge.

Which of the following is the act of a computer virus attaching itself to another computer program?

Piggybacking

Which of the following is NOT a similarity between a worm and virus?

They both use host programs to replicate.

Which of the following is also referred to as malware?

computer virus

Computer files generally back themselves up automatically, so there is no need to frequently back up important files.

false

Free anti-virus software on the Internet will protect a user's computer as well as a paid program.

false

There are two types of computer worms: a network worm and a __________.

host worm

A Trojan horse will possibly __________.

monitor browsing activity and keystrokes

Which of the following is a computer worm which copies different segments of itself to computers linked together in a network?

network worm

A virus which, if anyone attempted to view an infected sector, would replace it with the clean, original version of the sector is known as a ___________________

stealth virus

Viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list.

true

A computer __________ is a malicious, self-replicating independent program, but a computer __________ is a malicious program requiring a host program to replicate.

worm; virus

A Trojan horse will generally attempt to gain access to which type of area on a computer?

administrative


Kaugnay na mga set ng pag-aaral

Test 3 PSYCH Kneisl/Pearson CH 23,34,16,32,20,22,21,24,35,15,27,30

View Set

NCLEX Review Quiz 4 Saunder's Questions (Ch. 39, 40, 54-57)

View Set

Networking Threats, Assessments, and Defenses (Unit 8 Review) - [Network Security]

View Set

Health Law and Ethics Chapter #1 Test #1

View Set