InfoTech (Computer Worms and Viruses)

Ace your homework & exams now with Quizwiz!

In which year did researchers at Xerox Palo Alto Research developed the first experimental worm?

1980

In which year was the first virus, "Elk Cloner", created?

1982

In which year was the first anti-virus software introduced?

1990

Imprisonment time for a computer virus can range from 0 to BLANK

20 Years

Trojan horse

A malicious program disguised inside of another program seemingly beneficial or harmless

What will generally gain access to administrative areas on a computer

A trojan horse

Differences between a Worm and Virus

A virus requires a host program, A worm is an independent program. A virus modifies other programs, A worm usually does not. A virus only executes when the host program is running, A worm is always active.

A Trojan horse will generally attempt to gain access to which type of area on a computer?

Administrative

Which of the following types of viruses copies itself onto a computer or a disk when the computer is booted up?

Boot sector Virus

Similarities of a Worm and Virus

Both usually contain malicious instructions. They cause an increasing amount of damage.

Which of the following is also referred to as Malware?

Computer Virus

The first virus created in 1982 was the ______________ virus

Elk Cloner

Computer files generally back themselves up automatically, so there is no need to frequently back up important files

False

Free anti-virus software on the Internet will protect a user's computer as well as a paid program

False

There are two types of computer worms: a network worm and a BLANK

Host Worm

According to the Computer Fraud and Abuse Act, what is the punishment for creating a worm or virus for fraud?

Imprisonment for up to 20 years and/or a fine

Which of the following is true about a worm?

It moves or copies itself to a computer without the user's knowledge

Which of the following is NOT an action of protecting a computer from viruses?

Leaving the computer log in when using a public computer

Which of the following is an anti-virus software recommended only for the Windows ® system?

McAfee VirusScan

A Trojan horse will possibly __________

Monitor Keystrokes. Monitor browsing activity.

Which of the following is the first worm to be distributed over a network without other users being aware of its presence?

Morris Worm

Which of the following is a computer worm which copies different segments of itself to computers linked together in a network?

Network Worm

Which of the following is an anti-virus software recommended for both the Windows ® and Mac ® system?

Norton AntiVirus

Which of the following is the act of a computer virus attaching itself to another computer program?

Piggybacking

Who wrote the book "Computer Virus: A High Tech Disease" which explains how to create a virus?

Ralph Burger

A virus which, if anyone attempted to view an infected sector, would replace it with the clean, original version of the sector is known as a ____________

Stealth Virus

Which of the following is NOT a similarity between a worm and virus?

They both use host programs to replicate

Viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list

True

A computer __________ is a malicious, self-replicating independent program but a computer __________ is a malicious program requiring a host program to replicate

Worm ; Virus


Related study sets

English Final Exam A Good Man is Hard to Find by Flannery O' Connor

View Set

Chapter 12: Dietary Supplements (Questions-2)

View Set

BUS1B Managerial Accounting Chapter 2

View Set

Lifestyle disease & Risk factors (Sheltered)

View Set

Strategic Management: Business Models: Test 2

View Set

Chapter 41, Introduction to the Sensory System

View Set

Section 1.7- Security Assessment Techniques/ 1.8- Penetration Testing Techniques

View Set