Exam 5: Malware
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
Malware that is portable to all operating systems or platforms is considered web-based code.
Free
(True/False)
4.8/5
(34)
Correct Answer:
True
The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
The virus/worm that specifically targets Linux computers is ________.
Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
D
The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts.
(True/False)
4.8/5
(37)
Malware that executes when a specific criteria is met is a logic bomb.
(True/False)
4.7/5
(43)
The Bagle virus contained email attachments and a fake virus warning.
(True/False)
4.8/5
(35)
The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.
(True/False)
4.7/5
(29)
The virus/worm that specifically targets Macintosh computers is ________.
(Multiple Choice)
4.9/5
(40)
A rootkit collects user IDs and passwords to other machines on a network,giving the hacker root or privileged access.
(True/False)
4.9/5
(39)
A program that looks benign but actually has a malicious purpose is a _______.
(Multiple Choice)
4.8/5
(25)
After a virus is on your system,it can do anything a legitimate program can do.
(True/False)
4.8/5
(29)
The most common way for a virus to spread is by __________.
(Multiple Choice)
4.8/5
(37)
The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.
(Multiple Choice)
4.7/5
(34)
The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.
(Multiple Choice)
4.8/5
(37)
The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.
(Multiple Choice)
4.7/5
(40)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)