Chapter 5 Quiz CISS 341

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is NOT part of a sound malware prevention strategy?

Disable boot time virus checking.

Which of the following is a type of malware that modifies or replaces one or more existing programs to hide the fact a computer has been compromised?

Rootkit

Which of the following refers to software that masquerades as an apparently harmless program or data file but contains malware instructions?

Trojan horse

Which of the following is a software program that attaches itself to, or copies itself into, another program for the purpose of causing the computer to follow instructions that were not intended by the original program developer?

Virus

The practice of identifying malware based on previous experience is referred to as:

heuristics.

The organized collection of known malware signatures is stored in a:

signature database.

The unique set of instructions that make up an instance of malware and distinguish it from other malware is referred to as its:

signature.

Software that covertly monitors and records pieces of information, such as Web surfing activities, is referred to as:

spyware.

Which of the following statements is NOT true regarding antivirus software?

Antivirus and anti-spyware software should not be used on the same computer system.

Which of the following refers to a condition in which a running program stores data in an area outside the memory location set aside for the data?

Buffer overflow

Which of the following is NOT a common anti-malware software component?

Buffer overflow—a location to isolate unidentified malware for deletion

The two primary resources you should consult in developing a malware eradication plan are your anti-malware software's support resources and Microsoft's:

Malicious Software Removal Tool.

Which of the following statements is NOT true regarding anti-spyware software?

Only one anti-spyware product should be used at a time.

Malware is loosely divided into what two main categories?

Programs that spread or infect and programs that hide

Which of the following refers to a type of malware that attempts to generate funds directly from a computer user by attacking the computer and limiting the user's ability to access it until some money is paid?

Ransomware


Set pelajaran terkait

Psych 354 Final Exam (chapters 1-14)

View Set

Exam 3 Chapter 13 Book Questions

View Set

Network+ Objective 5.2 - Network Troubleshooting Tools

View Set

Junior English 2nd Semester : 1. NONFICTION

View Set