Avoiding Computer Viruses

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

ZAINAB: Let's see—hold on—I'm trying to open another file in Microsoft Word right now... Hey—it worked! Another of my Word files opens just fine. I guess my Art History file is corrupt, so I'll have to use my backup. Can you tell me though how my computer can catch a virus? I mean, are there certain things I can avoid doing? a) One common way to get a virus is by booting up your computer with an infected flash drive left in a USB port. b) One way a lot of computers get viruses is when users launch an infected file they received as an email attachment. c) Viruses often hide in macros, so enabling such a macro in a Word or Excel file could infect your computer.

b) One way a lot of computers get viruses is when users launch an infected file they received as an email attachment.

ZAINAB: Can viruses spread across a regular computer network, like at my school. a) No, viruses can't spread across networks without users opening or executing a file. b) Some viruses can actually be spread across networks with no user interaction. c) The only way viruses can spread across networks is if hackers gain access to the network.

b) Some viruses can actually be spread across networks with no user interaction.

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background? a) A virus b) A worm c) A zombie d) A Trojan horse

d) A Trojan horse

ZAINAB: So once I have the antivirus software up and running, I'm all set then, right? a) Actually, you also need to make sure you update your antivirus software regularly. b) Antivirus software isn't enough. You need to make sure you update your operating system regularly.

a) Actually, you also need to make sure you update your antivirus software regularly.

What can I do to protect my computer? a) The most important preventive measure you can take is to install antivirus software. b) The most important preventive measure you can take is to install a firewall. c) Just avoid visiting unknown websites that may launch malicious scripts on your computer. d) The most important preventative measure you can take is to install packet filtering.

a) The most important preventive measure you can take is to install antivirus software.

ZAINAB: How often do I need to run my antivirus software? a) You should perform an active scan of your computer with it at least once a week. b) You should perform an active scan of your computer with it at least once a month c) Make sure you perform an active scan of your computer with it every hour.

a) You should perform an active scan of your computer with it at least once a week.

A program that executes whenever a computer starts up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load is called a ________. a) boot-sector virus b) time bomb c) multipartite virus d) logic bomb

a) boot-sector virus

If my Microsoft Excel file is all garbled, could it have a virus? a) It sounds like you definitely have a virus. You need to run antivirus software. b) It sounds like it could be a virus, but it could also be another problem, such as a corrupt file. You should try to open other files in Excel first. c) It sounds like your Excel application itself is corrupt. You should try to reinstall Excel. d) Try to open your Excel file in a previous version of Excel. If it won't open, it is a virus.

b) It sounds like it could be a virus, but it could also be another problem, such as a corrupt file. You should try to open other files in Excel first.

ZAINAB: My Microsoft Word program doesn't seem to be working properly. When I try to open my Art History file, it's all garbled. I think I might have a virus, but I'm not sure. Can you help me? a) What you described sounds like it could be the result of a virus, but you should try to reinstall Microsoft Word first. b) What you described sounds like it could be a virus, but it could also be another problem, such as a corrupt file. Have you tried opening other files in Microsoft Word? c) From what you're describing, it sounds like you definitely have a virus. Have you run anti-virus software yet?

b) What you described sounds like it could be a virus, but it could also be another problem, such as a corrupt file. Have you tried opening other files in Microsoft Word?

Which of the following are considered slightly different from viruses as they can run independently of host file execution? a) Spam b) Worms c) Keystoke logger d) E-mail viruses

b) Worms

ZAINAB: Is it true that I can catch a virus from the Internet? a) Yes, you sure can. Some viruses are hidden in websites b) Yes, it's true. Sometimes hackers hide viruses in programs or files you download off the web. c) Fortunately, that's just an urban myth. You can't catch viruses from the Internet.

b) Yes, it's true. Sometimes hackers hide viruses in programs or files you download off the web.

A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called a ________. a) time bomb b) logic bomb c) worm d) macro virus

b) logic bomb

What exactly is a virus? a) A computer virus is a computer program that appears to be something useful or desirable (like a game or a screensaver), but at the same time does something malicious in the background without your knowledge, such as destroying your files. b) A computer virus is a computer program that looks at packets as they travel on the Internet and infects them with debilitating code. c) A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged. d) A computer virus is a computer program deployed by hackers that looks at each packet as it travels on the Internet.

c) A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged.

How do logic bombs and worms work? a) Logic bombs execute when a certain set of conditions is met and spread when infected files are passed from user to user, whereas worms infect a host file and wait for you to execute that file before they spread. b) Logic bombs run independently of host file execution and are much more active in spreading themselves, whereas worms infect a host file and wait for you to execute that file before they spread. c) Logic bombs execute when a certain set of conditions is met and are spread when infected files are passed from user to user, whereas worms run independently of host file execution and are much more active in spreading themselves. d) Logic bombs replicate themselves to a hard drive's master boot record, whereas worms run independently of host file execution and are much more active in spreading themselves.

c) Logic bombs execute when a certain set of conditions is met and are spread when infected files are passed from user to user, whereas worms run independently of host file execution and are much more active in spreading themselves.

So, am I all set after I have the antivirus software up and running? a) Yes. You are all set and can use your computer without fear of infection from viruses or worms. b) Not really. You need to make sure you update your application software regularly. c) Not really. You need to keep both your antivirus software and your system software up-to-date. d) Not really. You need to update your application and system software.

c) Not really. You need to keep both your antivirus software and your system software up-to-date.

How can my computer catch a virus? a) One way your computer can get a virus is when too many people use the same computer. b) One way your computer can get a virus is by booting it with an unformatted DVD in the DVD drive. c) One way your computer can get a virus is by booting it with an infected flash drive left in a USB port. d) One way your computer can get a virus is by running antivirus programs.

c) One way your computer can get a virus is by booting it with an infected flash drive left in a USB port.

And what are scripts? a) Scripts are programs or files you download off the web. Once executed, they perform their malicious duties in the background, often invisible to the user. NO b) Scripts are programs that seem to be screensavers but actually perform other activities that can harm your computer in the background. c) Scripts are mini programs that are executed without your knowledge when you enter a site. d) Scripts are changes in its own code that avoid detection.

c) Scripts are mini programs that are executed without your knowledge when you enter a site.

ZAINAB: So how can I protect my system? a) Try to avoid visiting obscure websites that may launch nasty scripts on your computer. b) The key is to never open e-mail attachments unless you're sure who sent you the e-mail. c) The most important preventive measure you can take is to install antivirus software.

c) The most important preventive measure you can take is to install antivirus software.

A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ________. a) worm b) bug c) virus d) spam

c) virus

What are macro viruses and e-mail viruses? a) Macro viruses are the opposite of micro viruses and attack only large data files, whereas e-mail viruses are attached to your e-mail and affect the e-mail contents. b) Macro viruses run a program that searches for common types of data files and compresses them. E-mail viruses are enabled when the e-mail is opened. c) Macro viruses are enabled when macros in the documents that they are attached to are run, whereas e-mail viruses are enabled when the e-mail is opened. d) Macro viruses are attached to documents that contain macros, whereas e-mail viruses come as e-mail attachments.

d) Macro viruses are attached to documents that contain macros, whereas e-mail viruses come as e-mail attachments.

Which of the following could be detected by antivirus software? a) E-mail attachments b) Spam c) Downloaded images d) Macros

d) Macros

A ________ is a small program that executes without your knowledge when you enter a website. a) keystroke logger b) worm c) macro d) script

d) script


Set pelajaran terkait

FIT Midterm Review, Microsoft PowerPoint Skills Project, Excel Unit D Terms, Excel: Chapter 3, ComSt 102 Exam 2, Excel 2010 - Comprehensive, Microsoft PowerPoint Fundamentals, PowerPoint Chapter 1, PowerPoint 2: Fundamentals, Powerpoint Lesson 1 and...

View Set

Mandatory Reporting of Child Abuse

View Set

Chapter 26 Fluid, Electrolyte, and acid-base balance

View Set

Chapter 30: The Child with a Skin Condition

View Set

Chapter 7 Management and Leadership

View Set