Exam 10: Malicious Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ________ lies dormant until a predefined condition is met; the program then triggers an unauthorized act

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

C

The earliest significant worm infection was released onto the Internet by _________ in 1988.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

Robert Morris

Many forms of infection can be blocked by denying normal users the right to modify programs on the system.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

True

Viruses often morph to evade detection.

(True/False)
4.9/5
(38)

A _________ is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms.

(Short Answer)
4.8/5
(31)

_________ is software that collects information from a computer and transmits it to another system

(Multiple Choice)
4.8/5
(26)

A backdoor is any mechanism that bypasses a normal security check.

(True/False)
4.8/5
(35)

A _________ is a set of programs installed on a system to maintain covert access to that system with administrator privileges, while hiding evidence of its presence to the greatest extent possible.

(Short Answer)
4.9/5
(40)

The first function in the propagation phase for a network worm is for it to search for other systems to infect, a process known as scanning or __________.

(Short Answer)
4.9/5
(29)

A __________ virus is a virus that mutates with every infection, making detection by the "signature" of the virus impossible

(Multiple Choice)
4.9/5
(33)

To replicate itself, a worm uses some means to access remote systems.

(True/False)
4.9/5
(33)

A _________ , also known as a trapdoor, is a secret entry point into a program that allows someone who is aware of the door to gain access without going through the usual security access procedures.

(Short Answer)
4.9/5
(35)

As an alternative to just destroying data, some malware encrypts the user's data and demands payment in order to access the key needed to recover this information.This is sometimes known as _________

(Multiple Choice)
4.9/5
(36)

__________ is software (macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics

(Multiple Choice)
4.9/5
(44)

__________ capture keystrokes on a compromised system.

(Short Answer)
4.8/5
(32)

Unsolicited bulk e-mail, commonly known as ________, imposes significant costs on both the network infrastructure needed to relay this traffic and on users who need to filter their legitimate e-mails out of this flood.

(Short Answer)
4.8/5
(39)

In a ________ attack the attacker is able to implant zombie software on a number of sites distributed throughout the Internet

(Multiple Choice)
4.8/5
(38)

A _________ attack is an attack on a computer system or network that causes a loss of service to users

(Multiple Choice)
4.9/5
(33)

A _________ is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network.

(Short Answer)
4.9/5
(41)

A virus, although attached to an executable program, cannot do anything that the program is permitted to do.

(True/False)
4.7/5
(38)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)