Deck 9: Defending Against Virus Attacks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/28
Play
Full screen (f)
Deck 9: Defending Against Virus Attacks
1
Self-replication and rapid spread define a computer ____________.
virus
2
Which is a virus\worm spread in the form of a holiday greeting card?
A)Bropia
B)Mabutu
C)Santy
D)Zafi
A)Bropia
B)Mabutu
C)Santy
D)Zafi
D
3
In the event a virus is isolated on an infected machine,which would likely NOT be a necessary step to remove the threat?
A)Find and follow virus removal instructions on the Internet.
B)Isolate the infected machine(s).
C)Run an antivirus program.
D)Reformat the machine and restore from backup.
A)Find and follow virus removal instructions on the Internet.
B)Isolate the infected machine(s).
C)Run an antivirus program.
D)Reformat the machine and restore from backup.
D
4
Which antivirus software provides Private Data Protection and Home Network Control components for home users?
A)Avast!
B)Norton
C)Panda
D)PC-cillin
A)Avast!
B)Norton
C)Panda
D)PC-cillin
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
5
Which is the most effective and common method for defending a system against viruses and worms?
A)Download only to a machine not connected to the rest of the network.
B)Install and run antivirus software all the time.
C)Set all user accounts so they cannot install software or change browser settings.
D)Set browsers to block ActiveX and scripts.
A)Download only to a machine not connected to the rest of the network.
B)Install and run antivirus software all the time.
C)Set all user accounts so they cannot install software or change browser settings.
D)Set browsers to block ActiveX and scripts.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
6
Which antivirus software provides audible voice alerts?
A)Avast!
B)McAfee
C)Norton
D)Panda
A)Avast!
B)McAfee
C)Norton
D)Panda
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
7
Which is the most widespread danger to a computer connected to the Internet?
A)Denial of service attacks
B)Password attacks
C)Session hacking
D)Viruses and worms
A)Denial of service attacks
B)Password attacks
C)Session hacking
D)Viruses and worms
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
8
How does the Santy worm attack?
A)It is transmitted as a holiday greeting card to encourage users to open it.
B)It uses two worms rather than one to increase the infection.
C)It uses Microsoft messaging applications to attack machines.
D)It uses Perl script to attack a vulnerability in certain PHP bulletin board applications.
A)It is transmitted as a holiday greeting card to encourage users to open it.
B)It uses two worms rather than one to increase the infection.
C)It uses Microsoft messaging applications to attack machines.
D)It uses Perl script to attack a vulnerability in certain PHP bulletin board applications.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
9
What is the first priority in the event a virus is detected on your computer?
A)Determine where the virus came from.
B)Determine many machines are infected.
C)Scan the computer to determine the extent of the infection.
D)Stop the spread of the virus.
A)Determine where the virus came from.
B)Determine many machines are infected.
C)Scan the computer to determine the extent of the infection.
D)Stop the spread of the virus.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
10
A computer virus:
A)deletes files or changes system settings.
B)locates and records e-mail addresses on a computer.
C)records keystrokes and other activity.
D)self-replicates and spreads rapidly.
A)deletes files or changes system settings.
B)locates and records e-mail addresses on a computer.
C)records keystrokes and other activity.
D)self-replicates and spreads rapidly.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
11
A computer worm:
A)is less likely to damage a computer than a virus is.
B)can spread without user action such as downloading a file or opening an attachment.
C)cannot be identified or blocked with anti-virus software.
D)remains on one computer and does not spread across networks.
A)is less likely to damage a computer than a virus is.
B)can spread without user action such as downloading a file or opening an attachment.
C)cannot be identified or blocked with anti-virus software.
D)remains on one computer and does not spread across networks.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
12
After cleaning a virus infection,what is the best way to assure that it does not recur?
A)Determine how the infection happened in the first place.
B)Install a firewall.
C)Update the antivirus software.
D)Use a better antivirus software.
A)Determine how the infection happened in the first place.
B)Install a firewall.
C)Update the antivirus software.
D)Use a better antivirus software.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
13
Which best describes the relationship between ease of use and security?
A)The easier it is to use a system,the more secure it is.
B)The easier it is to use a system,the less secure it is.
C)The more secure you make a system,the easier it is to use.
D)None of the statements are correct.
A)The easier it is to use a system,the more secure it is.
B)The easier it is to use a system,the less secure it is.
C)The more secure you make a system,the easier it is to use.
D)None of the statements are correct.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
14
Which is LEAST likely to be an effective method to isolate a suspected virus?
A)Disconnect backup devices from the infected machine.
B)Disconnect an infected machine from the network.
C)Disconnect servers from the network.
D)Disconnect the subnetwork.
A)Disconnect backup devices from the infected machine.
B)Disconnect an infected machine from the network.
C)Disconnect servers from the network.
D)Disconnect the subnetwork.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
15
Which is a worm that infects with a variant of the Rbot via various Microsoft messenger services?
A)Bropia
B)Mabutu
C)Santy
D)Zafi
A)Bropia
B)Mabutu
C)Santy
D)Zafi
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
16
What is the most common method by which viruses spread?
A)By reading the e-mail address book and mailing itself to everyone listed.
B)By scanning the computer and following network connections.
C)By accessing the e-mail database and cloning sent mail.
D)By users downloading and installing unauthorized files from the Web.
A)By reading the e-mail address book and mailing itself to everyone listed.
B)By scanning the computer and following network connections.
C)By accessing the e-mail database and cloning sent mail.
D)By users downloading and installing unauthorized files from the Web.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
17
Which antivirus software provides home and commercial versions which utilize known virus signatures and heuristics methods to identify new worms?
A)Avast!
B)Norton
C)Panda
D)PC-cillin
A)Avast!
B)Norton
C)Panda
D)PC-cillin
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
18
What is different about the Bropia infection?
A)It utilizes a holiday greeting card to encourage users to open it.
B)It carries two worms rather than one.
C)It uses the Google search engine to find bulletin board systems to attack.
D)It uses Perl script to attack a PHP vulnerability.
A)It utilizes a holiday greeting card to encourage users to open it.
B)It carries two worms rather than one.
C)It uses the Google search engine to find bulletin board systems to attack.
D)It uses Perl script to attack a PHP vulnerability.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
19
Which is NOT an effective strategy to improve antivirus protection?
A)Do not open attachments unless you are positive about it.
B)Download only to a machine not connected to the network.
C)Be skeptical of any e-mail you are sent.
D)Respond to Microsoft security alerts and install advertised patches immediately.
A)Do not open attachments unless you are positive about it.
B)Download only to a machine not connected to the network.
C)Be skeptical of any e-mail you are sent.
D)Respond to Microsoft security alerts and install advertised patches immediately.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
20
Which antivirus software includes a virus infection map?
A)Avast!
B)McAfee
C)Norton
D)PC-cillin
A)Avast!
B)McAfee
C)Norton
D)PC-cillin
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
21
Most antivirus applications store virus information in files with the extension ____________ that are regularly updated.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
22
To minimize security risks,systems should be configured to block or warn users before downloading any ____________ code such as ActiveX or Java applets.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
23
Scanning by use of rules to determine whether a file or program is acting like a virus is called ____________ scanning.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
24
Perhaps due to its prevalence,____________ is the e-mail program most often hit by virus and worm attacks.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)____________ is a program that can spread without any human intervention.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
26
Although a virus ____________ is actually a fake pretending to be a virus,it can cause people to delete files or make unneeded changes in their system.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
27
Some antivirus software actually scans ____________ on the server prior to downloading it to the local client.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
28
A multilingual,Linux-compatible,antivirus software is available by free download for home and non-commercial uses and is named ____________.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck