9-2 Flashcards

1
Q

____________ virus hoax used an email toget a person to delete a specific file that was actually needed by the systemic will ask you to delete the ________.exe file.

A

JDBGMGR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

JDBGMGR.exe is actually the Microsoft _____________________ for java. deleting this may cause java based web applets to not function properly

A

Debugger Registar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this hoax showed up in 2003 via email that tried to get the recipient to believe that filing taxes via online is not safe. this hoax did not cause much damage , it just shook the confidence of users in the online Efile system

A

tax return hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this hoax causes no direct harm but can become a huge annoyance, the equivilant of a prank phone called _________

A

W32 Torch Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

first known ransomware was the 1989 ________________ that only encrypted filenames with a weak symetric cipher

A

PC Cyborg Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this ransomware started spreading within health care. this began in Russia and Ukraine

A

2017 wannacry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a virus that attacks the computer in multiple ways

A

multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it installs itself and then ramins in RAM from the time the computer is noted up to when it is shutdown

A

memory resident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

an ___________ uses techniques that make it hard to analyze. code confusion is one such method. The code is written such that if the virus is disassembled, the code wont be easily followed. compressing code is another method .

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 types of stealth viruses

A

sparse infector
encrypted
polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this virus attempts to elude detection by performing it’s malicious activities only sporadically. with this type of virus the user will see symptoms for a short period, then no symptoms, then syptoms again. in this case the virus the infector targets a specific program but only executes every 10 to 20th time it runs.

A

sparse infector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sometimes a virus is __________ even with weak _____________, just enough to prevent n antivirus program from recognizing it

A

encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

changes its forms from time to time to prevent detection by antivirus software.

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

more complex , advanced viruses are developed in _________. One __________ may do very little except get itself installed o the target.

A

modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2 ways for a virus scanner to work. one is off a ______ list. the second is to watch for typical___________ of a virus

A

known virus

behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly