Computer Security Chapter 6 Exam 15 Questions with Verified Answers
A program that is covertly inserted into a system with the intent of compromising
... [Show More] the integrity or confidentiality of the victim's data is __________.
A. Adobe
B. Animoto
C. Malware
D. Prezi - CORRECT ANSWER C. Malware
__________ are used to send large volumes of unwanted e-mail.
A. Rootkits
B. Spammer programs
C. Downloaders
D. Auto-rooters - CORRECT ANSWER B. Spammer programs
A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
A. logic bomb
B. trapdoor
C. worm
D. Trojan horse - CORRECT ANSWER A. logic bomb
The term "computer virus" is attributed to __________.
A. Herman Hollerith
B. Fred Cohen
C. Charles Babbage
D. Albert Einstein - CORRECT ANSWER B. Fred Cohen
Computer viruses first appeared in the early __________.
A. 1960s
B. 1970s
C. 1980s
D. 1990s - CORRECT ANSWER C. 1980s
The __________ is what the virus "does".
A. infection mechanism
B. trigger
C. logic bomb
D. payload - CORRECT ANSWER D. payload
The __________ is when the virus function is performed.
A. dormant phase
B. propagation phase
C. triggering phase
D. execution phase - CORRECT ANSWER D. execution phase
During the __________ the virus is idle.
A. dormant phase
B. propagation phase
C. triggering phase
D. execution phase - CORRECT ANSWER A. dormant phase
A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents.
A. boot sector infector
B. file infector
C. macro virus
D. multipartite virus - CORRECT ANSWER C. macro virus
__________ is the first function in the propagation phase for a network worm.
A. Propagating
B. Fingerprinting
B. Keylogging
D. Spear phishing - CORRECT ANSWER B. Fingerprinting
Unsolicited bulk e-mail is referred to as __________.
A. spam
B. propagating
C. phishing
D. crimeware - CORRECT ANSWER A. spam
__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information.
A. Trojan horse
B. Ransomware
C. Crimeware
D. Polymorphic - CORRECT ANSWER B. Ransomware
A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.
A. spam
B. phishing
C. DDoS
D. sniff - CORRECT ANSWER C. DDoS
The ideal solution to the threat of malware is __________.
A. identification
B. removal
C. detection
D. prevention - CORRECT ANSWER D. prevention
__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.
A. Fingerprint-based scanners
B. Behavior-blocking software
C. Generic decryption technology
D. Heuristic scanners - CORRECT ANSWER B. Behavior-blocking software [Show Less]