Computer Security Chapter 6

Ace your homework & exams now with Quizwiz!

__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions. A. Fingerprint-based scanners B. Behavior-blocking software C. Generic decryption technology D. Heuristic scanners

B. Behavior-blocking software

__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information. A. Trojan horse B. Ransomware C. Crimeware D. Polymorphic

B. Ransomware

__________ are used to send large volumes of unwanted e-mail. A. Rootkits B. Spammer programs C. Downloaders D. Auto-rooters

B. Spammer programs

Computer viruses first appeared in the early __________. A. 1960s B. 1970s C. 1980s D. 1990s

C. 1980s

A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________. A. Adobe B. Animoto C. Malware D. Prezi

C. Malware

T or F? A bot propagates itself and activates itself, whereas a worm is initially controlled from some central facility.

False

T or F? A macro virus infects executable portions of code.

False

T or F? It is not possible to spread a virus via an USB stick.

False

T or F? Keyware captures keystrokes on a compromised system.

False

T or F? Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

False

T or F? A Trojan horse is an apparently useful program containing hidden code that, when invoked, performs some harmful function.

True

T or F? A logic bomb is the event or condition that determines when the payload is activated or delivered.

True

T or F? A virus that attaches to an executable program can do anything that the program is permitted to do.

True

T or F? E-mail is a common method for spreading macro viruses.

True

T or F? Every bot has a distinct IP address.

True

T or F? In addition to propagating, a worm usually carries some form of payload.

True

T or F? Malicious software aims to trick users into revealing sensitive personal data.

True

T or F? Many forms of infection can be blocked by denying normal users the right to modify programs on the system.

True

T or F? Packet sniffers are mostly used to retrieve sensitive information like usernames and passwords.

True

T or F? Programmers use backdoors to debug and test programs.

True

A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met. A. logic bomb B. trapdoor C. worm D. Trojan horse

A. logic bomb

Unsolicited bulk e-mail is referred to as __________. A. spam B. propagating C. phishing D. crimeware

A. spam

During the __________ the virus is idle. A. dormant phase B. propagation phase C. triggering phase D. execution phase

A. dormant phase

__________ is the first function in the propagation phase for a network worm. A. Propagating B. Fingerprinting B. Keylogging D. Spear phishing

B. Fingerprinting

The term "computer virus" is attributed to __________. A. Herman Hollerith B. Fred Cohen C. Charles Babbage D. Albert Einstein

B. Fred Cohen

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users. A. spam B. phishing C. DDoS D. sniff

C. DDoS

A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents. A. boot sector infector B. file infector C. macro virus D. multipartite virus

C. macro virus

The __________ is when the virus function is performed. A. dormant phase B. propagation phase C. triggering phase D. execution phase

D. execution phase

The __________ is what the virus "does". A. infection mechanism B. trigger C. logic bomb D. payload

D. payload

The ideal solution to the threat of malware is __________. A. identification B. removal C. detection D. prevention

D. prevention


Related study sets

CH 9 Prosocial Behavior: Doing What's Best for Others

View Set

Week 8, 9, & 10: Controlled Substances Part 1

View Set

Introduction of Corporate Governance

View Set

All of Unidad 7-Physical Science

View Set