Network Defense and Countermeasures Ch. 9
What differentiates a virus from a worm?
Worms propagate without human intervention.
In the context of viruses, what is a .dat file?
A file with virus definitions
What was the taxpayer virus hoax?
An e-mail that claimed that online tax submissions were infected and unsafe
In addition to any malicious payload, what is the most common way a virus or worm causes harm to a system?
By increasing network traffic and overloading the system
Which of the following should be the least important consideration when purchasing antivirus software?
Cost of the software
Which of the following did the most to contribute to the wide spread of the Zafi.d worm?
It claimed to be a holiday card and was released just prior to a major holiday
Which of the following is a useful feature in Norton AntiVirus not found in most other antivirus solutions?
It does a pre-installation scan
Which of the following is the primary reason that Microsoft Outlook is so often a target for virus attacks?
It is easy to write programs that access Outlook's inner mechanisms
What additional malicious activity did the Rombertik virus attempt?
It overwrote the master boot record
Which of the following is a useful feature in Avast antivirus not found in most other antivirus solutions?
It starts with a tutorial for new users
What was the most dangerous aspect of Zafi.d?
It tried to overwrite parts of virus scanners.
What was the primary propagation method for the Kedi RAT virus?
It used its own SMTP engine to e-mail itself.
Which of the following is a useful feature in McAfee not found in most other antivirus solutions?
Its main screen has a security rating for your system
What is active code scanning?
Scanning for active web elements (scripts, ActiveX, and so on)
What is heuristic scanning?
Scanning using a rules-based approach
What is the most common method of virus propagation?
Through e-mail attachments