Exam 1- Chapter 5- IS5610 Cybersecurity
The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.
Bagle
If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack.
Buffer-overflow
In a virus attack, the victim machine is the source
False
The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.
False
The I Love You virus caused harm because
It generated large numbers of emails that bogged down many networks
The Microsoft Office suite is a tempting target for viruses because
It is designed so that legitimate programmers can access its internal objects
The virus/worm that specifically targets Macintosh computers is _______
MacDefender
The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.
Mimail
The virus/worm that specifically targets Linux computers is ________.
None of the above (MacDefender Troj/Invo-Zip, W32/Netsky-P)
The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.
Nonvirus
The virus/worm transmitted in a zip file attached to an email with an enticing message is __________.
Troj/Invo-Zip
A program that looks benign but actually has a malicious purpose is a _______.
Trojan Horse
A rootkit collects user IDs and passwords to other machines on a network, giving the hacker root or privileged access
True
A virus is any file that can self-replicate
True
After a virus is on your system, it can do anything a legitimate program can do
True
Malware that executes when a specific criteria is met is a logic bomb
True
Malware that is portable to all operating systems or platforms is considered web-based code
True
The Bagle virus contained email attachments and a fake virus warning
True
The most common method to deliver spyware to a target system is by using a Trojan Horse
True
The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts
True
The most common way for a virus to spread is by
Use of your email contacts
Any file that can self-replicate is a ________.
Virus
McAfee and Norton are examples of ________.
Virus Scanners
The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.
W32/Netsky-P
A program that can propagate without human interference is a _______.
Worm