Exam 10: Malicious Software
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
A ________ lies dormant until a predefined condition is met; the program then triggers an unauthorized act
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
C
The earliest significant worm infection was released onto the Internet by _________ in 1988.
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Robert Morris
Many forms of infection can be blocked by denying normal users the right to modify programs on the system.
Free
(True/False)
4.8/5
(42)
Correct Answer:
True
A _________ is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms.
(Short Answer)
4.8/5
(31)
_________ is software that collects information from a computer and transmits it to another system
(Multiple Choice)
4.8/5
(26)
A backdoor is any mechanism that bypasses a normal security check.
(True/False)
4.8/5
(35)
A _________ is a set of programs installed on a system to maintain covert access to that system with administrator privileges, while hiding evidence of its presence to the greatest extent possible.
(Short Answer)
4.9/5
(40)
The first function in the propagation phase for a network worm is for it to search for other systems to infect, a process known as scanning or __________.
(Short Answer)
4.9/5
(29)
A __________ virus is a virus that mutates with every infection, making detection by the "signature" of the virus impossible
(Multiple Choice)
4.9/5
(33)
To replicate itself, a worm uses some means to access remote systems.
(True/False)
4.9/5
(33)
A _________ , also known as a trapdoor, is a secret entry point into a program that allows someone who is aware of the door to gain access without going through the usual security access procedures.
(Short Answer)
4.9/5
(35)
As an alternative to just destroying data, some malware encrypts the user's data and demands payment in order to access the key needed to recover this information.This is sometimes known as _________
(Multiple Choice)
4.9/5
(36)
__________ is software (macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics
(Multiple Choice)
4.9/5
(44)
Unsolicited bulk e-mail, commonly known as ________, imposes significant costs on both the network infrastructure needed to relay this traffic and on users who need to filter their legitimate e-mails out of this flood.
(Short Answer)
4.8/5
(39)
In a ________ attack the attacker is able to implant zombie software on a number of sites distributed throughout the Internet
(Multiple Choice)
4.8/5
(38)
A _________ attack is an attack on a computer system or network that causes a loss of service to users
(Multiple Choice)
4.9/5
(33)
A _________ is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network.
(Short Answer)
4.9/5
(41)
A virus, although attached to an executable program, cannot do anything that the program is permitted to do.
(True/False)
4.7/5
(38)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)