quiz 10 espinosa
A false positive stored in the Virus Vault is:
Easily restored within the interface
Adware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software
False
Adware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software.
False
Covert channels are not capable of transferring information using a mechanism that was not designed for the purpose
False
Covert channels are not capable of transferring information using a mechanism that was not designed for the purpose.
False
Delivering malicious software via IM is relatively difficult becausae IM software has had strong security controls from the beginning
False
Scareware is software specifically designed to display advertisements on a system in the form of popup or nag screens
False
The first viruses debuted in the wild in the 1990s as ways to destroy exam records at universities
False
When a virus scan is complete, AVG displays a(n) __________ showing the number of threats that were identified and removed.
Report Summary
Which AVG feature scans every single file as it is opened, saved, or copied?
Resident Shield
Which of the following laws was originally passed to address federal computer-related offenses and the cracking of computer systems?
The Computer Fraud and Abuse Act of 1986
Which feature of AVG enables you to remove specific files or folder from the scan?
The Exceptions feature
Which of the following statements is NOT true about dictionary-based virus detection?
This method can detect both viruses that it knows about and those it does not know about.
Which of the following is NOT one of the key goals of a backdoor?
To obtain a Trojan construction kit
Which of the following is malware that looks legitimate but hides a payload that does something unwanted?
Trojan
A software development kit specifically designed to facilitate the design and development of Trojans is called a
Trojan construction kit
Hardware based keystroke loggers can be plugged into a universal serial bus (USB) or PS2 port on a system and monitor the passing signals for keystrokes
True
Hoax viruses are those designed to make the user take action even though no infection or threat exists
True
In some cases, spyware creators have stated their intentions outright by presenting end user license agreements (EULAS) to the victim
True
Malware can be used to turn a system into a server hosting any type of content, such as illegal music or movies, pirated software, pornography, and financial data
True
Malware in the current day has been adopted by criminals for a wide array of purposes to capture information about the victim or commit other acts
True
Which of the following is a U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?
Trusted Computer System Evaluation Criteria (TCSEC)
hardware based keystroke loggers are plugged into _____ or ____
USB PS2 port
Which of the following types of malware is a piece of code or software that spreads from system to system by attaching itself to other files and is activated when the file is accessed?
Virus
Which of the following is a malware program designed to replicatewithout attaching to or infecting other files on a host system?
Worm
A slow response opening applications or browsing the Internet, applications not working as they normally would, and the operating system not booting up correctly are all symptoms of:
a malware infection
Which of the following terms is used to describe a correctly formatted document that appears to be malware to an antivirus program?
false positive
Which of the following terms includes anything developed for the purpose of doing harm?
malware
A section of the hard drive record responsible for assisting in locating the operating system to boot the computer is called the:
master boot records (MBRs)
setting up a piece of software to listen on specified ports
port direction
A process where communications are redirected to different ports than they would normally be destined for is called:
port redirection
The Virus Vault is considered a __________ where all removed files, virus infected or suspicious, are stored until you take action on them.
quarantine area
In addition to updating the signatures database regularly, it is also important to:
research and apply any patches to the antivirus software itself.
Which of the following checkbox options would you use to ensure that a scan will run on startup if the computer were off at the scheduled time?
run when computer starts up if task has been missed
Antivirus vendors usually update their antivirus signature files:
several times per week
Which of the following is an approach to identifying viruses in which the program recognizes symptoms of a virus?
suspicious behavior
By default, AVG scans:
the whole computer
Each threat identified by AVG is given a __________ of high, medium, or low.
threat severity rating
In the AVG Report Summary, what did the green checkmark indicate?
whether or not each threat was removed from your computer
The information regarding the results of an AVG scan is saved in the:
AVG history
Which of the following is a next-generation Trojan tool that was designed to accept customized, specially designed plug-ins?
Back Orifice (BO2K)
Which of the following is NOT a type of malware?
Gameware
Which of the following is a remote access Trojan authored entirely in Delphi that uses TCP port 26097 by default?
Let Me Rule
Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs?
Logic bomb
Which of the following types of viruses infects and operates through the use of a programming language built into applications such as Microsoft Office in the form of Visual Basic for Applications (VBA)?
Macro virus
Which of the following terms refers to any software that is inherently hostile, intrusive, or annoying in its operation?
Malware
Which of the following types of viruses infects using multiple attack vectors, including the boot sector and executable files on the hard drive?
Multipart virus
Which of the following types of viruses is designed to change their code and "shape" to avoid detection by virus scanners, which would look for a specific virus code and not the new version?
Polymorphic virus
Which one of the following is NOT a goal of Trojans?
Replicating
AVG automatically updates the database on a regular basis, as long as the machine is:
able to reach the internet
Which of the following is true regarding antivirus programs?
antivirus programs are designed to stop the spread and activity of viruses
The part of a hard drive or removable media that is used to boot programs is called the:
boot sector
Which of the following is an approach to identifying viruses in which the program uses a signatures database to identify a virus?
dictionary-based detection
All the files in the Virus Vault are:
encrypted and cannot do the computer any harm