Computer Security Midterm2 CH8
logic bomb
A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
rootkit
A ______________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.
blended attack
A _________________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.
virus
A computer __________________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself.
T
A logic bomb is the event or condition that determines when the payload is activated or delivered. (True Or False)
F
A macro virus infects executable portions of code. (True Or False)
malware
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________.
T
A virus that attaches to an executable program can do anything that the program is permitted to do. (True Or False)
T
Malicious software aims to trick users into revealing sensitive personal data. (True Or False)
T
Many forms of infection can be blocked by denying normal users the right to modify programs on the system. (True Or False)
F
Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. (True Or False)
Spammer programs
__________ are used to send large volumes of unwanted e-mail.
trigger
Sometimes known as a "logic bomb", the __________________ is the event or condition that determines when the payload is activated or delivered.
infection mechanism
Sometimes referred to as the "infection vector", the __________________ is the means by which a virus spreads or propagates.
payload
The __________ is what the virus "does".
execution phase
The __________ is when the virus function is performed.
propagation
The four phases of a typical virus are: dormant phase, triggering phase, execution phase and _________________ phase.
Fred Cohen
The term "computer virus" is attributed to __________.
1980s
Computer viruses first appeared in the early __________.
triggering
During the __________________ phase the virus is activated to perform the function for which it was intended.
F
It is not possible to spread a virus via an USB stick. (True Or False)
F
Keyware captures keystrokes on a compromised system. (True Or False)