Exam 6: Malicious Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A __________ is when a user views a Web

Free
(Essay)
4.7/5
(36)
Correct Answer:
Verified

drive-by-download

__________ code refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

Free
(Essay)
4.9/5
(30)
Correct Answer:
Verified

Mobile

Programmers use backdoors to debug and test programs.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.

(Essay)
4.9/5
(37)

__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information.

(Multiple Choice)
4.8/5
(43)

The __________ is when the virus function is performed.

(Multiple Choice)
4.7/5
(25)

A bot propagates itself and activates itself,whereas a worm is initially controlled from some central facility.

(True/False)
4.9/5
(31)

__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

(Multiple Choice)
4.9/5
(35)

During the __________ the virus is idle.

(Multiple Choice)
4.7/5
(33)

Keyware captures keystrokes on a compromised system.

(True/False)
4.9/5
(35)

A logic bomb is the event or condition that determines when the payload is activated or delivered.

(True/False)
4.8/5
(26)

The __________ is what the virus "does".

(Multiple Choice)
4.7/5
(42)

In addition to propagating,a worm usually carries some form of payload.

(True/False)
4.7/5
(34)

Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

(True/False)
4.9/5
(29)

A macro virus infects executable portions of code.

(True/False)
4.7/5
(40)

E-mail is a common method for spreading macro viruses.

(True/False)
4.8/5
(32)

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

(Multiple Choice)
4.8/5
(38)

The ideal solution to the threat of malware is __________.

(Multiple Choice)
4.8/5
(28)

The four phases of a typical virus are: dormant phase,triggering phase,execution phase and __________ phase.

(Essay)
4.9/5
(36)

A virus that attaches to an executable program can do anything that the program is permitted to do.

(True/False)
4.9/5
(35)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)