Lesson 8 Flashcards

1
Q

Which virus put infected computers into a network where they can be remotely controlled?

A

Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymptomatic means a virus _____

A

Is difficult to detect because it replicates itself as a program that appears to be safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Love Letter virus was characterized by _____.

A

a malicious email which seemed to come from someone in the victim’s mailing list with a ‘Love-Letter-for-You-txt.vbs’ attachment

answer txt.vbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan viruses are downloaders that:

A

spread other malicious programs and remotely control the computer it is downloaded on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first computer virus developed was the _____.

A

Bob Thomas of BBN created the very first virus called the Creeper Program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The beginning of computer viruses stemmed from _____.

A

the Replicating Automata concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a computer virus?

A

It is malicious code that had been designed to replicate itself in its host causing system disruptions, instability, unauthorized modifications, or disability of core functions and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Brain Boot virus is so-called because it affects the _____ of the host device.

A

The Brain Boot virus would alter the boot sector of any floppy disk used to copy a particular software package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which option below best describes the primary intent of a Trojan horse?

A

The primary intent of a Trojan horse is to obtain personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is considered a decreased measurable?

A

A decreased measurable, like a loss of battery life, could point to mobile malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The term ‘rooting’ applies to which of these?

A

Android systems are ‘rooted’ when the controls in the operating system are ignored.

answer: android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is a way to take a preventative measure against malware?

A

The others are only useful once malware has made its way to your phone.

answer: keeping your operating system up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware that is used to steal your information and send it to a third party is known as _____

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Areas of Weakness
What is malware? - def examples, types
the history of computer viruses

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly