Exam 5: Malware

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Malware that is portable to all operating systems or platforms is considered web-based code.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

True

The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

The virus/worm that specifically targets Linux computers is ________.

Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
Verified

D

The I Love You virus caused harm because ________.

(Multiple Choice)
4.7/5
(31)

The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts.

(True/False)
4.8/5
(37)

Malware that executes when a specific criteria is met is a logic bomb.

(True/False)
4.7/5
(43)

The Bagle virus contained email attachments and a fake virus warning.

(True/False)
4.8/5
(35)

McAfee and Norton are examples of ________.

(Multiple Choice)
4.7/5
(31)

The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.

(True/False)
4.7/5
(29)

The virus/worm that specifically targets Macintosh computers is ________.

(Multiple Choice)
4.9/5
(40)

A virus is any file that can self-replicate.

(True/False)
4.8/5
(35)

A rootkit collects user IDs and passwords to other machines on a network,giving the hacker root or privileged access.

(True/False)
4.9/5
(39)

A program that looks benign but actually has a malicious purpose is a _______.

(Multiple Choice)
4.8/5
(25)

Any file that can self-replicate is a ________.

(Multiple Choice)
4.9/5
(39)

After a virus is on your system,it can do anything a legitimate program can do.

(True/False)
4.8/5
(29)

The most common way for a virus to spread is by __________.

(Multiple Choice)
4.8/5
(37)

The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.

(Multiple Choice)
4.7/5
(34)

The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.

(Multiple Choice)
4.8/5
(37)

The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.

(Multiple Choice)
4.7/5
(40)

In a virus attack,the victim machine is the source.

(True/False)
4.8/5
(26)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)