Chapter 8

Ace your homework & exams now with Quizwiz!

What process involves installing another computer inside an existing computer to check for malware? Malware Analysis Virtual Machine Dynamic Analysis Anti-Virus Software

Virtual Machine

What operating system is affected most often by malware? Windows Mac Google Android

Windows

A _____ replicates itself and is capable of moving between systems without human intervention. Adware Worm Virus Hijacker

Worm

Which of the following types of malware copy themselves to other computers? Trojans Spyware Viruses Worms

Worms

The Love Letter virus was characterized by _____ a malicious attachment to a game that seemed to come from the victim's friend a malicious email that seemed to come from someone in the victim's mailing list with a 'Love-Letter-for-You.txt' attachment a piece of malicious email that would alter the boot sector of any floppy disk storage device to which it was copied a malicious email which seemed to come from someone in the victim's mailing list with a 'Love-Letter-for-You-txt.vbs' attachment

a malicious email which seemed to come from someone in the victim's mailing list with a 'Love-Letter-for-You-txt.vbs' attachment

The Brain Boot virus is so-called because it affects the _____ of the host device. brain automata boot brain boot sector software

boot sector

Which option below contains a key word or words used to describe a primary characteristic of a Trojan horse? obvious display fast execution disguised open source

disguised

The beginning of computer viruses stemmed from _____. the Bob Thomas theroem the Basit and Amjad Farooq paper the Replicating Automata concept the Onel de Guzman concept

the Replicating Automata concept

What is the one sure way to eliminate any and all malware from any device? Upgrading the OS There is no one way A factory restore Running anti-malware

A factory restore

Which of these would mobile malware affect? A laptop A desktop A server A phone

A phone

Which of these is an indication of slow performance that may signal that a phone is infected with malware? Battery life loss over time A phone crashing frequently Rooting the phone A phone running slow while doing video editing

A phone crashing frequently

What is scareware? A tactic that attempts to get users to download a malicious product. A virus that spreads other malicious programs None are correct A virus that groups computers together to create a network

A tactic that attempts to get users to download a malicious product.

Which of the following makes a virus different from a worm? A worm requires human intervention to spread. A virus requires human intervention to spread. A worm is in computer code, and a virus is on web pages. A virus is in computer code, and a worm is on web pages.

A virus requires human intervention to spread.

_____ is a type of malware that may cause pop-up advertisements to appear outside the web browser. Anti-malware Software Spyware Trojan Virus Adware

Adware

Which of the following is a characteristic of malware? Attacks different aspects of a computer system. All of the answers are correct. Comes in many forms. Can disable or damage a computer.

All of the answers are correct.

Which of these can be the victim of a Trojan horse attack? Android tablets iPad All of these can be the victim of a Trojan horse attack. Personal computers

All of these can be the victim of a Trojan horse attack.

The term 'rooting' applies to which of these? iOS and Android iOS Blackberry Android

Android

Which of these platforms permits users to install anti-malware software? Both of them Android Neither of them iOS

Android

How will a consumer notice malware at the end of the billing cycle? Bill reduction Service suspended There is no way to notice Bill hike

Bill hike

What is the first step described in this lesson that you can take to remove a computer virus? Turn the computer system off Disconnect the computer from the Internet Boot into Safe Mode Install anti-virus software

Boot into Safe Mode

Which virus put infected computers into a network where they can be remotely controlled? Trojan Melissa Scareware Botnets

Botnets

What is the best defense against a worm virus? Call tech support after you get infected. Buy a virus protection program to eliminate it after you get infected. Buy a firewall that blocks everything. Buy good antivirus software when you set up your computer and update it regularly.

Buy good antivirus software when you set up your computer and update it regularly.

How do you access Windows Safe mode? Running a computer program from the desktop. By turning the computer off and not powering it back on. Insert an operating system disk into the CD-Rom tray. By pressing a special key (usually F8) during the computer boot process.

By pressing a special key (usually F8) during the computer boot process.

Which of the below answers is not a symptom that a computer is infected with a computer virus? Missing computer files Random pop-up messages Slow or sluggish performance Computer staying on all night

Computer staying on all night

The first computer virus developed was the _____. Creeper Program Brain boot Virus Replicating Automata Love Letter Virus

Creeper Program

One way to avoid infecting a computer with a Trojan horse is identified by which option? Open attachments Activate hyperlinks when available Do not open unsolicited E-mail None of the above

Do not open unsolicited E-mail

Which of these is not an example of a famous worm virus? Code Red Michelangelo Donatello ILOVEYOU

Donatello

What form of analysis involves running the possibly infected file? Malware Analysis Static Analysis Dynamic Analysis Virtual Analysis

Dynamic Analysis

What type of malware takes over your web browser to change settings, such as your homepage or preferred search engine? Spyware Virus Adware Hijacker

Hijacker

What is an important policy for a company to have in place to when malware has infiltrated their systems? Firewalls Anti-Virus Software Internet Filters Incident Response Plan

Incident Response Plan

Asymptomatic means a virus _____. Is difficult to detect because it replicates itself as a program that appears to be safe. Has symptoms that are similar to viruses in humans Has the ability to multiply quickly into copies of itself Is easy to detect because the virus has suspicious symptoms.

Is difficult to detect because it replicates itself as a program that appears to be safe.

Which of the following is true about mobile malware? It can use up plenty of your phone's storage It only uses data networks It doesn't cause crashes It requires a phone to be updated.

It can use up plenty of your phone's storage

Which of these is a way to take a preventative measure against malware? Keeping your operating system up to date Anti-malware Reinstalling the operating system A factory restore

Keeping your operating system up to date

Which of these is considered a decreased measurable? Loss of battery life Increase in battery life Increase in storage space Rooting your phone

Loss of battery life

Which of these is not an example of an antivirus solution? McAfee Kaspersky MSBlast Avast

MSBlast

Malware is used to describe all types of bad software. Malware is a combination of what two words? Normal and adware Malicious and software Marketing and software Magnificent and software

Malicious and software

What is the best way to prevent mobile malware? Download apps from anywhere Never root or jailbreak your phone Don't use the phone except on a data plan Root your phone

Never root or jailbreak your phone

Which of the following is NOT a step in the removal of malware? None of the answers are correct. Detection Analysis Protection

None of the answers are correct.

Which of the following is NOT a way to protect your computer from a virus? Not installing updates Install updates Clear Internet cache and browsing history Use an anti-virus program

Not installing updates

Which option below best describes the primary intent of a Trojan horse? Make internal inquiries Obtain personal information Denies access to a user Executes a specific application

Obtain personal information

Which option below is a good way to limit the likelihood of a Trojan horse attack? Run your anti-virus software frequently Always download from sites recommended by friends Install and activate an E-mail filter Remove firewall and routers from you network

Run your anti-virus software frequently

Malware is advancing at the _____ rate as our ability to defend against it. Same Malware advancement isn't related to defense. Slower Faster

Same

Trojan viruses are downloaders that: Melt down the computer to a point of no function Trick people into downloading malicious anti-software Spread other malicious programs and can remotely control the computer. Put computers in a network

Spread other malicious programs and can remotely control the computer.

Malware that is used to steal your information and send it to a third party is known as _____. Adware Browser Helper Object Spyware Hijacker

Spyware

Which form of analysis involves going through lines of code but never running the file in question? Virtual Analysis Static Analysis Dynamic Analysis Malware Analysis

Static Analysis

The _____ is where many viruses reside on the computer system and it's a good first step to delete them. WinSXS Files Folder Software Distribution Files Folder Temporary Files Folder System32 Files Folder

Temporary Files Folder

What of the following happens if you perform a factory image restore of a computer system? The computer is reloaded back to its original state and all personal files, folders, and programs are usually overwritten. The computer is reloaded back to its original state and all files, folders, and programs are unaffected. The computer continues to operate in its current state. Viruses remain after the restore has been performed.

The computer is reloaded back to its original state and all personal files, folders, and programs are usually overwritten.

What is one of the differences between a virus and a worm? A virus spreads, but a worm doesn't spread. A worm spreads, but a virus doesn't spread. A virus is self-replicating. The user must perform an action for one of them to spread.

The user must perform an action for one of them to spread.

Which of the following is NOT a form of malware? Trojans Users Worms Viruses

Users


Related study sets

Monopolio - Tarjetas de Arca Comunal y Casualidad

View Set

Украинская литература

View Set

Lippincott for Taylor: Fundamentals of Nursing Chapter 7- Legal Dimensions of Nursing Practice

View Set

PSYC 356 Chp 15 Buss, PSYC 356 Chp 13 MaCrea and Costa

View Set

Physics II Final - MisConceptual Questions

View Set

Ch 3: Perceiving Ourselves and Others in Organizations

View Set