Deck 5: Malware

Full screen (f)
exit full mode
Question
After a virus is on your system,it can do anything a legitimate program can do.
Use Space or
up arrow
down arrow
to flip the card.
Question
The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.

A)Mimail
B)Bagle
C)Nonvirus
D)None of the above
Question
The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.
Question
The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.

A)Mimail
B)Bagle
C)Nonvirus
D)None of the above
Question
Malware that is portable to all operating systems or platforms is considered web-based code.
Question
The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts.
Question
The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)Sobig
Question
The virus/worm transmitted in a zip file attached to an email with an enticing message is __________.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)None of the above
Question
A virus is any file that can self-replicate.
Question
Malware that executes when a specific criteria is met is a logic bomb.
Question
The I Love You virus caused harm because ________.

A)It had a negative payload.
B)It erased data on computers.
C)It generated large numbers of emails that bogged down many networks.
D)None of the above.
Question
The most common method to deliver spyware to a target system is by using a Trojan horse.
Question
The most common way for a virus to spread is by __________.

A)Use of your email contacts
B)Scanning your computer for network connections and copying itself to other machines on the network
C)Locating Linux machines
D)None of the above
Question
In a virus attack,the victim machine is the source.
Question
The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.

A)Mimail
B)Bagle
C)Nonvirus
D)None of the above
Question
The Bagle virus contained email attachments and a fake virus warning.
Question
The virus/worm that specifically targets Linux computers is ________.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)None of the above
Question
A rootkit collects user IDs and passwords to other machines on a network,giving the hacker root or privileged access.
Question
The virus/worm that specifically targets Macintosh computers is ________.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)None of the above
Question
The Microsoft Office suite is a tempting target for viruses because ___________.

A)It is so ubiquitous.
B)It is designed so that legitimate programmers can access its internal objects.
C)It contains virus programming tools.
D)None of the above.
Question
A program that looks benign but actually has a malicious purpose is a _______.

A)Trojan horse
B)Virus
C)Worm
D)Cookie
Question
McAfee and Norton are examples of ________.

A)Viruses
B)Worms
C)Trojan horses
D)Virus scanners
Question
A program that can propagate without human interference is a _______.

A)Virus
B)Worm
C)Trojan horse
D)None of the above
Question
Any file that can self-replicate is a ________.

A)Virus
B)Worm
C)Trojan horse
D)None of the above
Question
If a program writes more information into the computer's memory than the memory was designed to hold,it is a(n)___________ attack.

A)Buffer-overflow
B)RAM
C)Spyware
D)Adware
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Malware
1
After a virus is on your system,it can do anything a legitimate program can do.
True
2
The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.

A)Mimail
B)Bagle
C)Nonvirus
D)None of the above
A
3
The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.
False
4
The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.

A)Mimail
B)Bagle
C)Nonvirus
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Malware that is portable to all operating systems or platforms is considered web-based code.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)Sobig
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
The virus/worm transmitted in a zip file attached to an email with an enticing message is __________.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
A virus is any file that can self-replicate.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Malware that executes when a specific criteria is met is a logic bomb.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
The I Love You virus caused harm because ________.

A)It had a negative payload.
B)It erased data on computers.
C)It generated large numbers of emails that bogged down many networks.
D)None of the above.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The most common method to deliver spyware to a target system is by using a Trojan horse.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The most common way for a virus to spread is by __________.

A)Use of your email contacts
B)Scanning your computer for network connections and copying itself to other machines on the network
C)Locating Linux machines
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
In a virus attack,the victim machine is the source.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.

A)Mimail
B)Bagle
C)Nonvirus
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The Bagle virus contained email attachments and a fake virus warning.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
The virus/worm that specifically targets Linux computers is ________.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
A rootkit collects user IDs and passwords to other machines on a network,giving the hacker root or privileged access.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The virus/worm that specifically targets Macintosh computers is ________.

A)W32/Netsky-P
B)Troj/Invo-Zip
C)MacDefender
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The Microsoft Office suite is a tempting target for viruses because ___________.

A)It is so ubiquitous.
B)It is designed so that legitimate programmers can access its internal objects.
C)It contains virus programming tools.
D)None of the above.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
A program that looks benign but actually has a malicious purpose is a _______.

A)Trojan horse
B)Virus
C)Worm
D)Cookie
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
McAfee and Norton are examples of ________.

A)Viruses
B)Worms
C)Trojan horses
D)Virus scanners
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
A program that can propagate without human interference is a _______.

A)Virus
B)Worm
C)Trojan horse
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Any file that can self-replicate is a ________.

A)Virus
B)Worm
C)Trojan horse
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
If a program writes more information into the computer's memory than the memory was designed to hold,it is a(n)___________ attack.

A)Buffer-overflow
B)RAM
C)Spyware
D)Adware
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.