chapter 5
A signature database that is 1 month old may potentially expose that computer to how many new threats?
10,800,000
Why is a rootkit so difficult to detect?
A rootkit may have modified the tools used to detect it.
Which of the following best describes a zero-day attack?
Malware that is actively exploiting an unknown vulnerability
What is the best first step to take when malware is discovered soon after installing new software?
Uninstall the new software.
The Morris worm exploited this vulnerability: ________.
buffer overflow
What is the best first step to take if initial actions to remove malware are not successful?
disconnect the computer from the network
Which of the following terms means identifying malware based on past experience?
heuristic analysis
Which type of malware modifies or replaces parts of the operating system to hide the fact that the computer has been compromised?
rootkit
Which of the following anti-malware components is also referred to as a real-time scanner?
shield
Which term describes a unique set of instructions that identify malware code?
signature
Which type of malware covertly primarily collects pieces of information?
spyware
Which type of malware disguises itself as a useful program?
trojan
Which of the following terms describes a secure location to store identified malware?
vault
Which anti-malware tool is included with Windows 10?
windows defender
Which type of malware is a stand-alone program that replicates and sends itself to other computers?
worm