chapter 5

Ace your homework & exams now with Quizwiz!

A signature database that is 1 month old may potentially expose that computer to how many new threats?

10,800,000

Why is a rootkit so difficult to detect?

A rootkit may have modified the tools used to detect it.

Which of the following best describes a zero-day attack?

Malware that is actively exploiting an unknown vulnerability

What is the best first step to take when malware is discovered soon after installing new software?

Uninstall the new software.

The Morris worm exploited this vulnerability: ________.

buffer overflow

What is the best first step to take if initial actions to remove malware are not successful?

disconnect the computer from the network

Which of the following terms means identifying malware based on past experience?

heuristic analysis

Which type of malware modifies or replaces parts of the operating system to hide the fact that the computer has been compromised?

rootkit

Which of the following anti-malware components is also referred to as a real-time scanner?

shield

Which term describes a unique set of instructions that identify malware code?

signature

Which type of malware covertly primarily collects pieces of information?

spyware

Which type of malware disguises itself as a useful program?

trojan

Which of the following terms describes a secure location to store identified malware?

vault

Which anti-malware tool is included with Windows 10?

windows defender

Which type of malware is a stand-alone program that replicates and sends itself to other computers?

worm


Related study sets

Catarata (GPC: Sin comorbilidades de segmento anterior / Adulto y adulto mayor en primer nivel)

View Set

Ap Gov Chapter 13 Practice Test--- Ari Cerja

View Set

Chapter 10 Information and Decision Support Systems

View Set

Chapter 19: Documenting and Reporting

View Set