Exam 1- Chapter 5- IS5610 Cybersecurity

Ace your homework & exams now with Quizwiz!

The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.

Bagle

If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack.

Buffer-overflow

In a virus attack, the victim machine is the source

False

The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.

False

The I Love You virus caused harm because

It generated large numbers of emails that bogged down many networks

The Microsoft Office suite is a tempting target for viruses because

It is designed so that legitimate programmers can access its internal objects

The virus/worm that specifically targets Macintosh computers is _______

MacDefender

The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.

Mimail

The virus/worm that specifically targets Linux computers is ________.

None of the above (MacDefender Troj/Invo-Zip, W32/Netsky-P)

The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.

Nonvirus

The virus/worm transmitted in a zip file attached to an email with an enticing message is __________.

Troj/Invo-Zip

A program that looks benign but actually has a malicious purpose is a _______.

Trojan Horse

A rootkit collects user IDs and passwords to other machines on a network, giving the hacker root or privileged access

True

A virus is any file that can self-replicate

True

After a virus is on your system, it can do anything a legitimate program can do

True

Malware that executes when a specific criteria is met is a logic bomb

True

Malware that is portable to all operating systems or platforms is considered web-based code

True

The Bagle virus contained email attachments and a fake virus warning

True

The most common method to deliver spyware to a target system is by using a Trojan Horse

True

The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts

True

The most common way for a virus to spread is by

Use of your email contacts

Any file that can self-replicate is a ________.

Virus

McAfee and Norton are examples of ________.

Virus Scanners

The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.

W32/Netsky-P

A program that can propagate without human interference is a _______.

Worm


Related study sets

Chapter 25 Normal Newborn: Needs, Care, and Feeding

View Set

Social Advertising Fundamentals, Facebook Ad Structure and Campaign Options/Targeting, Advanced Audience Research and Targeting

View Set

Kuby Immunology Exam 5 Ch's 15-20

View Set

Financial Accounting- Chapter #6

View Set

Gas Laws: Pressure, Temperature, Volume & Gas Laws: Ideal Gas Laws

View Set