Filters
Question type

Study Flashcards

Malware that is portable to all operating systems or platforms is considered web-based code.

A) True
B) False

Correct Answer

verifed

verified

True

The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.


A) Mimail
B) Bagle
C) Nonvirus
D) None of the above

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A

The virus/worm that specifically targets Macintosh computers is ________.


A) W32/Netsky-P
B) Troj/Invo-Zip
C) MacDefender
D) None of the above

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.


A) Mimail
B) Bagle
C) Nonvirus
D) None of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The I Love You virus caused harm because ________.


A) It had a negative payload.
B) It erased data on computers.
C) It generated large numbers of emails that bogged down many networks.
D) None of the above.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The virus/worm that specifically targets Linux computers is ________.


A) W32/Netsky-P
B) Troj/Invo-Zip
C) MacDefender
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

D

The Bagle virus contained email attachments and a fake virus warning.

A) True
B) False

Correct Answer

verifed

verified

The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.


A) W32/Netsky-P
B) Troj/Invo-Zip
C) MacDefender
D) Sobig

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

McAfee and Norton are examples of ________.


A) Viruses
B) Worms
C) Trojan horses
D) Virus scanners

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

A program that looks benign but actually has a malicious purpose is a _______.


A) Trojan horse
B) Virus
C) Worm
D) Cookie

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Any file that can self-replicate is a ________.


A) Virus
B) Worm
C) Trojan horse
D) None of the above

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

After a virus is on your system,it can do anything a legitimate program can do.

A) True
B) False

Correct Answer

verifed

verified

A rootkit collects user IDs and passwords to other machines on a network,giving the hacker root or privileged access.

A) True
B) False

Correct Answer

verifed

verified

The most common way for a virus to spread is by __________.


A) Use of your email contacts
B) Scanning your computer for network connections and copying itself to other machines on the network
C) Locating Linux machines
D) None of the above

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.


A) Mimail
B) Bagle
C) Nonvirus
D) None of the above

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts.

A) True
B) False

Correct Answer

verifed

verified

Malware that executes when a specific criteria is met is a logic bomb.

A) True
B) False

Correct Answer

verifed

verified

The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.

A) True
B) False

Correct Answer

verifed

verified

A virus is any file that can self-replicate.

A) True
B) False

Correct Answer

verifed

verified

In a virus attack,the victim machine is the source.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 25

Related Exams

Show Answer