Multiple Choice
MATCHING
Match each term with the correct statement below.
-executable piece of programming code that should not appear in an e-mail attachment
A) shell
B) W32/Sobig.F
C) Luckysploit
D) Ping of Death
E) KeyGhost
F) Melissa
G) Back Orifice
H) Slammer
I) Mytob
Correct Answer:

Verified
Correct Answer:
Verified
Q2: _ or rootkits are computer programs that
Q3: Some security professionals use fear tactics to
Q4: IDS stands for _.<br>A)Intrusion Detection System<br>B)Information Dissemination
Q5: PKI stands for _.<br>A)Public Key Infrastructure<br>B)Private Key
Q7: MATCHING<br>Match each term with the correct statement
Q8: MATCHING<br>Match each term with the correct statement
Q9: What is Back Orifice?
Q10: The virus signature file is maintained by
Q11: MATCHING<br>Match each term with the correct statement
Q41: What types of ports do successful Trojan