Worms and Viruses Assessment
The first virus created in 1982 was the _____ virus.
Elk Cloner
Free anti-virus software on the Internet will protect a user's computer as well as a paid program. True or False?
False
A virus which if anyone attempted to view an infected sector, would replace it with the clean, original version of the sector is known as a _____.
Stealth virus
Which of the following is NOT a similarity between a worm and virus?
They both use host programs to replicate
Viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list. True or False?
True
A Trojan horse will generally attempt to gain access of which type of area on a computer?
Administrative
Which of the following viruses copies itself onto a computer or a disk when the computer is booted up?
Boot Sector Virus
A trojan horse will possibly _____.
Both A and B; monitor keystrokes and monitor browsing activity
Which of the following is also referred to as malware?
Computer Virus
According to the Computer Fraud and Abuse Act, what is the punishment for creating a worm or virus for fraud?
Imprisonment for up to 20 years and/or a fine
Which of the following is true about a worm?
It moves or copies itself to a computer without the user's knowledge
Which of the following is NOT an action of protecting a computer from viruses?
Leaving the computer log in when using a public computer
Which of the following is an anti-virus software recommended only for the Windows system?
McAfee VirusScan
Which of the following is the first worm to be distributed over a network without others users being aware of its presence?
Morris Worm
Which of the following is the act of a computer virus attaching itself to another computer program?
Piggybacking
Who wrote the book "Computer Virus: A High Tech Disease" which explains how to create a virus?
Ralph Burger
A computer _____ is a malicious, self-replicating independent program but a computer _____ is a malicious program requiring a host program to replicate.
Worm; Virus
In which year did researchers at Xerox Palo Alto Research developed the first experimental worm?
1980
In which year was the first virus, "Elk Cloner", created?
1982
In which year was the first anti-virus software introduced?
1990
Imprisonment time for a computer virus can range from 0 to _____.
20 years
Computer files generally back themselves up automatically, so there is no need to frequently back up important files. True or False?
False
There are two types of computer worms: a network wom and a _____
Host worm
Which of the following is a computer worm which copies different segments of itself to computers linked together in a network?
Network Worm
Which of the following is an anti-virus software recommended for both the Windows and Mac Systems?
Norton AntiVirus