Exam 6: Malicious Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Every bot has a distinct IP address.

Free
(True/False)
4.9/5
(47)
Correct Answer:
Verified

True

The term "computer virus" is attributed to __________.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

B

During the __________ phase the virus is activated to perform the function for which it was intended.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

triggering

__________ is the first function in the propagation phase for a network worm.

(Multiple Choice)
4.9/5
(39)

A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent.

(Short Answer)
4.8/5
(37)

A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.

(Short Answer)
4.7/5
(34)

A __________ virus is explicitly designed to hide itself from detection by anti-virus software.

(Short Answer)
4.9/5
(25)

Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.

(Short Answer)
4.9/5
(28)

A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.

(Short Answer)
4.8/5
(43)

A virus that attaches to an executable program can do anything that the program is permitted to do.

(True/False)
4.8/5
(30)

Sometimes known as a "logic bomb",the __________ is the event or condition that determines when the payload is activated or delivered.

(Short Answer)
4.9/5
(33)

__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information.

(Multiple Choice)
4.7/5
(32)

Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

(True/False)
4.8/5
(31)

__________ technology is an anti-virus approach that enables the anti-virus program to easily detect even the most complex polymorphic viruses and other malware,while maintaining fast scanning speeds.

(Short Answer)
4.8/5
(35)

The ideal solution to the threat of malware is __________.

(Multiple Choice)
4.8/5
(31)

The __________ is what the virus "does".

(Multiple Choice)
4.8/5
(42)

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

(Multiple Choice)
4.8/5
(34)

Keyware captures keystrokes on a compromised system.

(True/False)
4.8/5
(33)

Developed by IBM and refined by Symantec,the __________ provides a malware detection system that will automatically capture,analyze,add detection and shielding,or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere.

(Short Answer)
4.8/5
(35)

A __________ is a collection of bots capable of acting in a coordinated manner.

(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)