2-7 Flashcards

1
Q

microsoft office has been created so that a legitimate programer can access internal objects to create applications and intergrate into ___________

A

microsoft office suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

after a virus is on a system it ca do

A

anything a legitimate program can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an older virus with a multi modal threat( IE, it needed more then one mechanism to spread). it copied and shared itself with any other drive on the network. classified as a worm rather then a virus. described as virulent.

A

sobig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the sobig virus could be detected by the telltale signs in the sujector title of the__________

A

email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a variant of the sobig virus would have the computer download a file from the internet that would then cause ____________

A

printing problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

website that lists current viruses and what to look for in an email

A

F-Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

virus source code is both_________ and _________

A

readable and alterable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

infects the macros in office documents

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

microsoft outlook is designed so that a programmer can write scripts using a subset or the _______________

A

Visual basic programing language or visual basic for applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

does not infect the OS of the target computer but instead it attacks the __________

A

boot sector drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

by operating outside the OS a _________________ is harder to detect

A

boot secoter drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

one of the largest groups of viruses

A

stealth viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

by ataching itself to a legitimate program not only will this trick the user into installing the program, it will evade antivirus software

A

stealth virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

it changes its form in order to avoid detection by antivirus software

A

polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

attempt to elude detection by performing its malicious activity only

A

sparse infector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly