Exam 6: Malicious Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

During the __________ phase the virus is activated to perform the function for which it was intended.

Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Verified

triggering

The __________ is what the virus "does".

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.

Free
(Short Answer)
4.8/5
(42)
Correct Answer:
Verified

rootkit

A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.

(Short Answer)
4.8/5
(42)

A computer __________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself.

(Short Answer)
4.8/5
(24)

__________ is the first function in the propagation phase for a network worm.

(Multiple Choice)
4.9/5
(34)

Every bot has a distinct IP address.

(True/False)
4.9/5
(38)

A bot propagates itself and activates itself, whereas a worm is initiallycontrolled from some central facility.

(True/False)
4.8/5
(37)

The __________ is when the virus function is performed.

(Multiple Choice)
4.8/5
(34)

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

(Multiple Choice)
4.8/5
(35)

A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.

(Short Answer)
4.9/5
(44)

Packet sniffers are mostly used to retrieve sensitive information likeusernames and passwords.

(True/False)
4.9/5
(39)

The term "computer virus" is attributed to __________.

(Multiple Choice)
4.9/5
(30)

During the __________ the virus is idle.

(Multiple Choice)
4.9/5
(28)

It is not possible to spread a virus via a USB stick.

(True/False)
4.7/5
(33)

Programmers use backdoors to debug and test programs.

(True/False)
4.8/5
(33)

__________ are used to send large volumes of unwanted e-mail.

(Multiple Choice)
4.7/5
(35)

A macro virus infects executable portions of code.

(True/False)
4.8/5
(34)

__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

(Multiple Choice)
4.8/5
(29)

The four phases of a typical virus are: dormant phase, triggering phase, execution phase and __________ phase.

(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)