CJUS 3340 Ch. 7 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Worm

A piece of software that copies itself. This does not always require user intervention to spread. This type of threat does not attach itself to, or modify, other files. The name of this threat was taken from the book Shockwave Rider.

Which of the following is a trigger for a virus?

ALL OF THE ABOVE---Opening an e-mail attachment, Downloading a peer-to-peer file, and Self-execution on a certain date.

________ manifest(s) in several ways, including changes to the browser, redirecting startup pages on Internet browsers, replacing the search function within the browser, and generating pop-up ads and frames that can be difficult to delete or shut down.

Adware

Malicious code attacks that combine elements of worms, Trojans, and viruses are known as:

Blended threats

________ viruses operate based on algorithms of starting an operating system upon power on or reboot.

Boot

________ can reach very large sizes and may include thousands of machines.

Botnets

The first vastly spread virus was called "________."

Brain

Some researchers use the term ________ as a reference to the programs and tools that facilitate fraud and computer attacks.

Crimeware

A ________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server.

Denial-of-Service attack

A worm cannot spread without active intervention by the user.

False

Adware typically takes advantage of the fact that many software users do not read the end user license agreement (EULA) or the fine print during installation.

False

Apple computers are immune to viruses.

False

Boot viruses do not change infected files, but instead close the target file so that when run they "force" the OS to execute their code.

False

The main operating principle of a macrovirus is its capability to transfer its code to a remote service or workstation on its own.

False

The motives for many writers of malicious software have changed from profit to curiosity and revenge.

False

There is a central database that collects information on the damage that viruses cause.

False

Viruses are always written for criminal purposes.

False

Viruses of today are easy to detect as compared to early viruses.

False

Viruses operate in four primary environments: file viruses, boot viruses, microviruses, and network viruses.

False

Which of the following is NOT a way that viruses and other types of malicious code are primarily and currently spread?

Floppy disks

According to the Sans Institute, the number-one cyber threat is:

Increasingly sophisticated website attacks that exploit browser vulnerabilities

Which of the following is NOT a characteristic of spyware?

Internet users are rarely warned about spyware in EULAs

The unique feature of a worm is that it infects the memory of a computer and:

Is self-replicating

The greatest cost of a virus or malicious code attack is:

Loss of work hours and time spent patching systems

Which of the following is NOT one of the four primary environments viruses operate in?

Microviruses

The first known Internet worm was the ________ worm.

Morris

________ is the part of the virus program that delivers the malicious intent or other device.

Payload

According to the Symantec Internet Security Threat Report, system compromises and resulting data breaches were most likely the result of:

Phishing attacks

A ________ has no constant section of code.

Polymorphic virus

Which of the following type of Trojan horse turns a victim's computer into a zombie server available to the whole world or to the attacker only?

Proxy/Wingate Trojans

The largest group of attackers, comprising over 95% of the attacker population, is referred to as:

Script kiddies

Which of the following is NOT a type of Trojan horse discussed in the text?

Spyware Trojans

A virus can be categorized based on:

The type of environment it operates in

Virus

These operate in four primary environments. One form of this threat takes advantage of macro- languages built into common systems of business software. This type of threat operates based on the algorithm of starting an operating system upon power or reboot.

Trojan horse

This does not replicate nor copy itself. One form of this threat logs the keystrokes of the victim, allowing the attacker to search for passwords in the log file. A well-known form of this threat is named Sub7.

An unauthorized program typically contained within a legitimate program is known as a:

Trojan

A ________ is a program that neither replicates nor copies itself, but causes damage or compromises the security of the computer.

Trojan horse

Attack tools are increasingly being distributed through "zombie" machines that are compromised on university campuses.

True

Reports have shown that there were billions of cyber-attacks against U.S. interests in 2017.

True

The Sub Seven Trojan allows a remote attack virtual control over an infected machine.

True

Viruses and malicious code are graded based on the potential damage they can cause and their overall impact on computer operations at the individual level and across the world.

True

Viruses are operating system and software system specific.

True

Macro viruses are most commonly associated with:

Typical business software applications

Which of the following is true?

Virus hoaxes waste your time and cause fear

A ________ program enables an attacker to compromise and infect multiple computers at once.

bot

Spyware can be installed through ________, which are files that contain information about a program, a website, the user, or the user's computer.

cookies

Computer systems and software are graded in terms of their ________ to vulnerabilities.

exposure

The most common term used to describe how a virus is operating and the effect it is having is listing the virus as "in the wild", and the ________ of a virus measures the extent to which the virus is spreading among the computer users and systems.

wildness


Set pelajaran terkait

VARCAROLIS Chapter 28: Child, Older Adult, and Intimate Partner Violence

View Set

Wink wink get to know you questions

View Set

ITN100 Exam 1 Chapter 3 End of Chapter Questions

View Set

Chapter 15: Air Pollution and Stratospheric Ozone Depletion (APES)

View Set

Chapter 3 EEO & a Safe Workplace

View Set

Pediatrics ATI 2023 practice test A

View Set