Exam 2: Viruses, Worms, and Malicious Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What basic steps should be taken to protect an operating system from malicious software?

Free
(Essay)
4.9/5
(44)
Correct Answer:
Verified

1. Installing updates
2. Viewing what is loaded when a system is booted
3. Using malicious software scanners
4. Using digital signatures for system and driver files
5. Backing up systems and creating repair disks
6. Creating and implementing organizational policies

The _____ virus can only become destructive if the user executes an infected file on a Friday the thirteenth.

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

B

Match the following terms to the appropriate definitions.
A set of instructions used to find and load the operating system
back door
A removable disk used to boot an operating system
boot sector
Captures information about cookies sent between a Web server and a client
driver signing
Correct Answer:
Verified
Premises:
Responses:
A set of instructions used to find and load the operating system
back door
A removable disk used to boot an operating system
boot sector
Captures information about cookies sent between a Web server and a client
driver signing
The beginning of a disk where code to start up the operating system is stored
ASR Set
In Windows 2000, a disk that contains repair and backup information
cookie
The process of placing a digital signature in a device driver
ERD
A code that is placed in a file to verify its authenticity
MBR
Information that a Web server stores on a client computer
boot disk
A secret avenue into an operating system that bypasses normal security
digital signature
Backup media needed to start a failed Windows XP Pro system
spyware
Free
(Matching)
4.9/5
(33)
Correct Answer:
Verified

A(n) stealth virus uses defenses to make itself hard to find and detect.

(True/False)
4.8/5
(30)

List eight examples of executable-type file extensions and the operating systems that use them..

(Essay)
4.8/5
(33)

Which of the following virus programs is available for purchase on a Windows-based workstation?

(Multiple Choice)
4.9/5
(37)

Is one advantage of a digital signature that it helps ensure the security of your system by allowing only drivers and system files that have been verified by Microsoft?

(True/False)
4.8/5
(40)

Is Windows the only operating system that is vulnerable to a macro virus?

(True/False)
4.9/5
(33)

Software exploitation is particularly aimed at new software and new software versions.

(True/False)
4.8/5
(28)

With which attachment was the Resume virus associated?

(Multiple Choice)
4.8/5
(42)

Which anti-virus software is available for use on Macintosh, NetWare, UNIX/Linux, and Windows-based systems?

(Multiple Choice)
4.9/5
(38)

In its destructive mode, will the INIT 1984 virus rename files using random characters and delete files on hard drives?

(True/False)
4.9/5
(34)

The W32.Pinfi virus is an example of a destructive virus that can infect Mac OS systems.

(True/False)
4.8/5
(33)

A(n) _____ virus changes each time it is replicated, making it more difficult to create a defense against it.

(Multiple Choice)
4.8/5
(26)

The Code Red worm replicates for the first 23 days of the month and then stops.

(True/False)
4.9/5
(36)

The first stage of virus spread that occurs is replication within the infected system.

(True/False)
4.8/5
(29)

Which anti-virus software is available for use on only Windows and Mac OS systems?

(Multiple Choice)
4.8/5
(26)

A _____ virus appends to program files such as system files, executable files, driver files, and supplementary files, including .dlls.

(Multiple Choice)
4.9/5
(33)

A(n) ____________________ is a program that replicates and replicates on the same computer, or one that sends itself to many other computers on a network or the Internet.

(Short Answer)
4.9/5
(45)

In the ____________________ operating system, you can display the boot process by booting into either single user mode or verbose mode.

(Short Answer)
4.7/5
(21)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)