InfoTech (Computer Worms and Viruses)
In which year did researchers at Xerox Palo Alto Research developed the first experimental worm?
1980
In which year was the first virus, "Elk Cloner", created?
1982
In which year was the first anti-virus software introduced?
1990
Imprisonment time for a computer virus can range from 0 to BLANK
20 Years
Trojan horse
A malicious program disguised inside of another program seemingly beneficial or harmless
What will generally gain access to administrative areas on a computer
A trojan horse
Differences between a Worm and Virus
A virus requires a host program, A worm is an independent program. A virus modifies other programs, A worm usually does not. A virus only executes when the host program is running, A worm is always active.
A Trojan horse will generally attempt to gain access to which type of area on a computer?
Administrative
Which of the following types of viruses copies itself onto a computer or a disk when the computer is booted up?
Boot sector Virus
Similarities of a Worm and Virus
Both usually contain malicious instructions. They cause an increasing amount of damage.
Which of the following is also referred to as Malware?
Computer Virus
The first virus created in 1982 was the ______________ virus
Elk Cloner
Computer files generally back themselves up automatically, so there is no need to frequently back up important files
False
Free anti-virus software on the Internet will protect a user's computer as well as a paid program
False
There are two types of computer worms: a network worm and a BLANK
Host Worm
According to the Computer Fraud and Abuse Act, what is the punishment for creating a worm or virus for fraud?
Imprisonment for up to 20 years and/or a fine
Which of the following is true about a worm?
It moves or copies itself to a computer without the user's knowledge
Which of the following is NOT an action of protecting a computer from viruses?
Leaving the computer log in when using a public computer
Which of the following is an anti-virus software recommended only for the Windows ® system?
McAfee VirusScan
A Trojan horse will possibly __________
Monitor Keystrokes. Monitor browsing activity.
Which of the following is the first worm to be distributed over a network without other users being aware of its presence?
Morris Worm
Which of the following is a computer worm which copies different segments of itself to computers linked together in a network?
Network Worm
Which of the following is an anti-virus software recommended for both the Windows ® and Mac ® system?
Norton AntiVirus
Which of the following is the act of a computer virus attaching itself to another computer program?
Piggybacking
Who wrote the book "Computer Virus: A High Tech Disease" which explains how to create a virus?
Ralph Burger
A virus which, if anyone attempted to view an infected sector, would replace it with the clean, original version of the sector is known as a ____________
Stealth Virus
Which of the following is NOT a similarity between a worm and virus?
They both use host programs to replicate
Viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list
True
A computer __________ is a malicious, self-replicating independent program but a computer __________ is a malicious program requiring a host program to replicate
Worm ; Virus