quiz 10 espinosa

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A false positive stored in the Virus Vault is:

Easily restored within the interface

Adware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software

False

Adware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software.

False

Covert channels are not capable of transferring information using a mechanism that was not designed for the purpose

False

Covert channels are not capable of transferring information using a mechanism that was not designed for the purpose.

False

Delivering malicious software via IM is relatively difficult becausae IM software has had strong security controls from the beginning

False

Scareware is software specifically designed to display advertisements on a system in the form of popup or nag screens

False

The first viruses debuted in the wild in the 1990s as ways to destroy exam records at universities

False

When a virus scan is complete, AVG displays a(n) __________ showing the number of threats that were identified and removed.

Report Summary

Which AVG feature scans every single file as it is opened, saved, or copied?

Resident Shield

Which of the following laws was originally passed to address federal computer-related offenses and the cracking of computer systems?

The Computer Fraud and Abuse Act of 1986

Which feature of AVG enables you to remove specific files or folder from the scan?

The Exceptions feature

Which of the following statements is NOT true about dictionary-based virus detection?

This method can detect both viruses that it knows about and those it does not know about.

Which of the following is NOT one of the key goals of a backdoor?

To obtain a Trojan construction kit

Which of the following is malware that looks legitimate but hides a payload that does something unwanted?

Trojan

A software development kit specifically designed to facilitate the design and development of Trojans is called a

Trojan construction kit

Hardware based keystroke loggers can be plugged into a universal serial bus (USB) or PS2 port on a system and monitor the passing signals for keystrokes

True

Hoax viruses are those designed to make the user take action even though no infection or threat exists

True

In some cases, spyware creators have stated their intentions outright by presenting end user license agreements (EULAS) to the victim

True

Malware can be used to turn a system into a server hosting any type of content, such as illegal music or movies, pirated software, pornography, and financial data

True

Malware in the current day has been adopted by criminals for a wide array of purposes to capture information about the victim or commit other acts

True

Which of the following is a U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

Trusted Computer System Evaluation Criteria (TCSEC)

hardware based keystroke loggers are plugged into _____ or ____

USB PS2 port

Which of the following types of malware is a piece of code or software that spreads from system to system by attaching itself to other files and is activated when the file is accessed?

Virus

Which of the following is a malware program designed to replicatewithout attaching to or infecting other files on a host system?

Worm

A slow response opening applications or browsing the Internet, applications not working as they normally would, and the operating system not booting up correctly are all symptoms of:

a malware infection

Which of the following terms is used to describe a correctly formatted document that appears to be malware to an antivirus program?

false positive

Which of the following terms includes anything developed for the purpose of doing harm?

malware

A section of the hard drive record responsible for assisting in locating the operating system to boot the computer is called the:

master boot records (MBRs)

setting up a piece of software to listen on specified ports

port direction

A process where communications are redirected to different ports than they would normally be destined for is called:

port redirection

The Virus Vault is considered a __________ where all removed files, virus infected or suspicious, are stored until you take action on them.

quarantine area

In addition to updating the signatures database regularly, it is also important to:

research and apply any patches to the antivirus software itself.

Which of the following checkbox options would you use to ensure that a scan will run on startup if the computer were off at the scheduled time?

run when computer starts up if task has been missed

Antivirus vendors usually update their antivirus signature files:

several times per week

Which of the following is an approach to identifying viruses in which the program recognizes symptoms of a virus?

suspicious behavior

By default, AVG scans:

the whole computer

Each threat identified by AVG is given a __________ of high, medium, or low.

threat severity rating

In the AVG Report Summary, what did the green checkmark indicate?

whether or not each threat was removed from your computer

The information regarding the results of an AVG scan is saved in the:

AVG history

Which of the following is a next-generation Trojan tool that was designed to accept customized, specially designed plug-ins?

Back Orifice (BO2K)

Which of the following is NOT a type of malware?

Gameware

Which of the following is a remote access Trojan authored entirely in Delphi that uses TCP port 26097 by default?

Let Me Rule

Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs?

Logic bomb

Which of the following types of viruses infects and operates through the use of a programming language built into applications such as Microsoft Office in the form of Visual Basic for Applications (VBA)?

Macro virus

Which of the following terms refers to any software that is inherently hostile, intrusive, or annoying in its operation?

Malware

Which of the following types of viruses infects using multiple attack vectors, including the boot sector and executable files on the hard drive?

Multipart virus

Which of the following types of viruses is designed to change their code and "shape" to avoid detection by virus scanners, which would look for a specific virus code and not the new version?

Polymorphic virus

Which one of the following is NOT a goal of Trojans?

Replicating

AVG automatically updates the database on a regular basis, as long as the machine is:

able to reach the internet

Which of the following is true regarding antivirus programs?

antivirus programs are designed to stop the spread and activity of viruses

The part of a hard drive or removable media that is used to boot programs is called the:

boot sector

Which of the following is an approach to identifying viruses in which the program uses a signatures database to identify a virus?

dictionary-based detection

All the files in the Virus Vault are:

encrypted and cannot do the computer any harm


संबंधित स्टडी सेट्स

BNAD 276 Connect Answers Chp 6-8

View Set

Chapter 11: Differential Analysis

View Set

NUR 417 Genomics in Nursing Quiz #1

View Set

MGMT 329 CH3 EQUAL EMPLOYMENT OPPORTUNITY 3.1-3.7

View Set