Computer Security Chapter 6
__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions. A. Fingerprint-based scanners B. Behavior-blocking software C. Generic decryption technology D. Heuristic scanners
B. Behavior-blocking software
__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information. A. Trojan horse B. Ransomware C. Crimeware D. Polymorphic
B. Ransomware
__________ are used to send large volumes of unwanted e-mail. A. Rootkits B. Spammer programs C. Downloaders D. Auto-rooters
B. Spammer programs
Computer viruses first appeared in the early __________. A. 1960s B. 1970s C. 1980s D. 1990s
C. 1980s
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________. A. Adobe B. Animoto C. Malware D. Prezi
C. Malware
T or F? A bot propagates itself and activates itself, whereas a worm is initially controlled from some central facility.
False
T or F? A macro virus infects executable portions of code.
False
T or F? It is not possible to spread a virus via an USB stick.
False
T or F? Keyware captures keystrokes on a compromised system.
False
T or F? Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
False
T or F? A Trojan horse is an apparently useful program containing hidden code that, when invoked, performs some harmful function.
True
T or F? A logic bomb is the event or condition that determines when the payload is activated or delivered.
True
T or F? A virus that attaches to an executable program can do anything that the program is permitted to do.
True
T or F? E-mail is a common method for spreading macro viruses.
True
T or F? Every bot has a distinct IP address.
True
T or F? In addition to propagating, a worm usually carries some form of payload.
True
T or F? Malicious software aims to trick users into revealing sensitive personal data.
True
T or F? Many forms of infection can be blocked by denying normal users the right to modify programs on the system.
True
T or F? Packet sniffers are mostly used to retrieve sensitive information like usernames and passwords.
True
T or F? Programmers use backdoors to debug and test programs.
True
A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met. A. logic bomb B. trapdoor C. worm D. Trojan horse
A. logic bomb
Unsolicited bulk e-mail is referred to as __________. A. spam B. propagating C. phishing D. crimeware
A. spam
During the __________ the virus is idle. A. dormant phase B. propagation phase C. triggering phase D. execution phase
A. dormant phase
__________ is the first function in the propagation phase for a network worm. A. Propagating B. Fingerprinting B. Keylogging D. Spear phishing
B. Fingerprinting
The term "computer virus" is attributed to __________. A. Herman Hollerith B. Fred Cohen C. Charles Babbage D. Albert Einstein
B. Fred Cohen
A __________ attack is a bot attack on a computer system or network that causes a loss of service to users. A. spam B. phishing C. DDoS D. sniff
C. DDoS
A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents. A. boot sector infector B. file infector C. macro virus D. multipartite virus
C. macro virus
The __________ is when the virus function is performed. A. dormant phase B. propagation phase C. triggering phase D. execution phase
D. execution phase
The __________ is what the virus "does". A. infection mechanism B. trigger C. logic bomb D. payload
D. payload
The ideal solution to the threat of malware is __________. A. identification B. removal C. detection D. prevention
D. prevention