Computer Security Midterm2 CH8

Ace your homework & exams now with Quizwiz!

logic bomb

A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

rootkit

A ______________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.

blended attack

A _________________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.

virus

A computer __________________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself.

T

A logic bomb is the event or condition that determines when the payload is activated or delivered. (True Or False)

F

A macro virus infects executable portions of code. (True Or False)

malware

A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________.

T

A virus that attaches to an executable program can do anything that the program is permitted to do. (True Or False)

T

Malicious software aims to trick users into revealing sensitive personal data. (True Or False)

T

Many forms of infection can be blocked by denying normal users the right to modify programs on the system. (True Or False)

F

Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. (True Or False)

Spammer programs

__________ are used to send large volumes of unwanted e-mail.

trigger

Sometimes known as a "logic bomb", the __________________ is the event or condition that determines when the payload is activated or delivered.

infection mechanism

Sometimes referred to as the "infection vector", the __________________ is the means by which a virus spreads or propagates.

payload

The __________ is what the virus "does".

execution phase

The __________ is when the virus function is performed.

propagation

The four phases of a typical virus are: dormant phase, triggering phase, execution phase and _________________ phase.

Fred Cohen

The term "computer virus" is attributed to __________.

1980s

Computer viruses first appeared in the early __________.

triggering

During the __________________ phase the virus is activated to perform the function for which it was intended.

F

It is not possible to spread a virus via an USB stick. (True Or False)

F

Keyware captures keystrokes on a compromised system. (True Or False)


Related study sets

CMIT 326 Cloud Tech final exam 2

View Set

ATI Fundamentals Practice Questions

View Set

16.1 How the Foreign Exchange Market Works

View Set

5 - (Questions) Life Insurance Premiums, Proceeds, and Beneficiaries

View Set

Midterm set 2 - Recruitment and Selection

View Set