Exam 2: Viruses, Worms, and Malicious Software
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
What basic steps should be taken to protect an operating system from malicious software?
Free
(Essay)
4.9/5
(44)
Correct Answer:
1. Installing updates
2. Viewing what is loaded when a system is booted
3. Using malicious software scanners
4. Using digital signatures for system and driver files
5. Backing up systems and creating repair disks
6. Creating and implementing organizational policies
The _____ virus can only become destructive if the user executes an infected file on a Friday the thirteenth.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
B
Match the following terms to the appropriate definitions.
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.9/5
(33)
Correct Answer:
A(n) stealth virus uses defenses to make itself hard to find and detect.
(True/False)
4.8/5
(30)
List eight examples of executable-type file extensions and the operating systems that use them..
(Essay)
4.8/5
(33)
Which of the following virus programs is available for purchase on a Windows-based workstation?
(Multiple Choice)
4.9/5
(37)
Is one advantage of a digital signature that it helps ensure the security of your system by allowing only drivers and system files that have been verified by Microsoft?
(True/False)
4.8/5
(40)
Is Windows the only operating system that is vulnerable to a macro virus?
(True/False)
4.9/5
(33)
Software exploitation is particularly aimed at new software and new software versions.
(True/False)
4.8/5
(28)
Which anti-virus software is available for use on Macintosh, NetWare, UNIX/Linux, and Windows-based systems?
(Multiple Choice)
4.9/5
(38)
In its destructive mode, will the INIT 1984 virus rename files using random characters and delete files on hard drives?
(True/False)
4.9/5
(34)
The W32.Pinfi virus is an example of a destructive virus that can infect Mac OS systems.
(True/False)
4.8/5
(33)
A(n) _____ virus changes each time it is replicated, making it more difficult to create a defense against it.
(Multiple Choice)
4.8/5
(26)
The Code Red worm replicates for the first 23 days of the month and then stops.
(True/False)
4.9/5
(36)
The first stage of virus spread that occurs is replication within the infected system.
(True/False)
4.8/5
(29)
Which anti-virus software is available for use on only Windows and Mac OS systems?
(Multiple Choice)
4.8/5
(26)
A _____ virus appends to program files such as system files, executable files, driver files, and supplementary files, including .dlls.
(Multiple Choice)
4.9/5
(33)
A(n) ____________________ is a program that replicates and replicates on the same computer, or one that sends itself to many other computers on a network or the Internet.
(Short Answer)
4.9/5
(45)
In the ____________________ operating system, you can display the boot process by booting into either single user mode or verbose mode.
(Short Answer)
4.7/5
(21)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)