Sec 430 Ch 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is NOT part of a sound malware prevention strategy?

Disable boot time virus checking.

Which of the following is a type of malware that modifies or replaces one or more existing programs to hide the fact a computer has been compromised?

Rootkit

Which of the following refers to software that masquerades as an apparently harmless program or data file but contains malware instructions?

Trojan horse

Which of the following is a software program that attaches itself to, or copies itself into, another program for the purpose of causing the computer to follow instructions that were not intended by the original program developer?

Virus

The practice of identifying malware based on previous experience is referred to as:

heuristics.

The organized collection of known malware signatures is stored in a:

signature database

The unique set of instructions that make up an instance of malware and distinguish it from other malware is referred to as its:

signature.

Software that covertly monitors and records pieces of information, such as Web surfing activities, is referred to as:

spyware.

Current malware generally exists to fulfill all of the following purposes EXCEPT:

to perform "harmless" experiments or pranks.

Zero-day attacks occur under any of the following conditions EXCEPT:

when the malware and the vulnerability have been identified and a fix is readily available.

Which of the following statements is NOT true regarding antivirus software?

Antivirus and anti-spyware software should not be used on the same computer system.

Which of the following statements is NOT true regarding ransomware?

As Windows computers and devices become more mobile, they become less vulnerable to potential ransomware attacks

Which of the following refers to a condition in which a running program stores data in an area outside the memory location set aside for the data?

Buffer overflow

Which of the following is NOT a common anti-malware software component?

Buffer overflow—a location to isolate unidentified malware for deletion

The two primary resources you should consult in developing a malware eradication plan are your anti-malware software's support resources and Microsoft's:

Malicious Software Removal Tool.

Which of the following terms refers to a collection of different types of software that share the goal of infiltrating a computer and making it do something?

Malware

Which of the following statements is NOT true regarding anti-spyware software?

Only one anti-spyware product should be used at a time.

Malware is loosely divided into what two main categories?

Programs that spread or infect and programs that hide

Which of the following refers to a type of malware that attempts to generate funds directly from a computer user by attacking the computer and limiting the user's ability to access it until some money is paid?

Ransomware

Which of the following statements is NOT true regarding the performance of malware scans?

Removable media does not need to be scanned.


संबंधित स्टडी सेट्स

SAS Certified Specialist: Base Programming using SAS 9.4 (A00-231) Exam

View Set

The social sciences include all of the following except

View Set

NCLEX 10000 Foundations in Psychiatric Nursing

View Set

Microbiology MCC Scott Quinton Exam 3

View Set

ATG 401 - Exam 1 Multiple Choice

View Set