Worms and Viruses Assessment

Ace your homework & exams now with Quizwiz!

The first virus created in 1982 was the _____ virus.

Elk Cloner

Free anti-virus software on the Internet will protect a user's computer as well as a paid program. True or False?

False

A virus which if anyone attempted to view an infected sector, would replace it with the clean, original version of the sector is known as a _____.

Stealth virus

Which of the following is NOT a similarity between a worm and virus?

They both use host programs to replicate

Viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list. True or False?

True

A Trojan horse will generally attempt to gain access of which type of area on a computer?

Administrative

Which of the following viruses copies itself onto a computer or a disk when the computer is booted up?

Boot Sector Virus

A trojan horse will possibly _____.

Both A and B; monitor keystrokes and monitor browsing activity

Which of the following is also referred to as malware?

Computer Virus

According to the Computer Fraud and Abuse Act, what is the punishment for creating a worm or virus for fraud?

Imprisonment for up to 20 years and/or a fine

Which of the following is true about a worm?

It moves or copies itself to a computer without the user's knowledge

Which of the following is NOT an action of protecting a computer from viruses?

Leaving the computer log in when using a public computer

Which of the following is an anti-virus software recommended only for the Windows system?

McAfee VirusScan

Which of the following is the first worm to be distributed over a network without others users being aware of its presence?

Morris Worm

Which of the following is the act of a computer virus attaching itself to another computer program?

Piggybacking

Who wrote the book "Computer Virus: A High Tech Disease" which explains how to create a virus?

Ralph Burger

A computer _____ is a malicious, self-replicating independent program but a computer _____ is a malicious program requiring a host program to replicate.

Worm; Virus

In which year did researchers at Xerox Palo Alto Research developed the first experimental worm?

1980

In which year was the first virus, "Elk Cloner", created?

1982

In which year was the first anti-virus software introduced?

1990

Imprisonment time for a computer virus can range from 0 to _____.

20 years

Computer files generally back themselves up automatically, so there is no need to frequently back up important files. True or False?

False

There are two types of computer worms: a network wom and a _____

Host worm

Which of the following is a computer worm which copies different segments of itself to computers linked together in a network?

Network Worm

Which of the following is an anti-virus software recommended for both the Windows and Mac Systems?

Norton AntiVirus


Related study sets

C++ test 1, Exam 1 all T/F, Exam 1 Ch 2, CSCI 133 Data Structures Quiz 1, CSCI 133 - Exam 1, Candilocks

View Set

Logical Appeal, Argument, and Essay Structure Test

View Set

Teddy Roosevelt, Trust Busting, The Square Deal, and the PFDA

View Set

practice questions for exam 2 psy 360

View Set

Science 1001 self test 1 study guide

View Set

MGT 371 ch9: Building effective teams and teamwork

View Set