module 5 Flashcards

(12 cards)

1
Q

Learning Objectives:

Understand what malware is

Discuss different types of malware

Learn about countermeasures

Distinguish between viruses and worms

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Malware is any software that is designed to protect a computer system.

A

Answer: False. Malware is any software designed to disrupt, damage, or gain unauthorized access to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Contents Covered:

Definition of Malicious Software

Classification of Malicious Software

Security Against Malware

Virus vs. Worm

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multiple Choice: Which of the following is NOT a type of malware?

A. Virus

B. Worm

C. Firewall

D. Trojan Horse

A

Answer: C. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Short Answer: What distinguishes a Trojan horse from a virus?

A

Answer: A Trojan horse disguises itself as legitimate software to trick users into installing it, while a virus attaches itself to legitimate programs and requires user action to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which type of malware can replicate itself and spread without any user interaction?

A. Spyware

B. Worm

C. Virus

D. Adware

A

Answer: B. Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Short Answer: Explain one effective countermeasure to protect against malware.

A

Answer: Installing and regularly updating antivirus software is a key countermeasure. It helps detect, quarantine, and remove malicious software before it can cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Worms require a host file to spread from one system to another.

A

Answer: False. Unlike viruses, worms are standalone software that can spread independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multiple Choice: Which of the following best describes the behavior of a logic bomb?

A. Automatically spreads over a network

B. Records user keystrokes

C. Executes a malicious function when specific conditions are met

D. Encrypts files for ransom

A

Answer: C. Executes a malicious function when specific conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Short Answer: Describe how viruses and worms differ in their propagation methods.

A

Answer: Viruses require user interaction (like opening a file) to spread, whereas worms exploit system vulnerabilities to spread automatically across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multiple Choice: What is the primary goal of ransomware?

A. To secretly monitor user activities

B. To destroy hardware components

C. To lock users out of systems or files and demand payment

D. To increase network performance

A

Answer: C. To lock users out of systems or files and demand payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Essay-Like Prompt: Discuss the key differences between viruses and worms. How do these differences affect the way security professionals develop countermeasures?

A

Answer: Viruses attach themselves to files or programs and require user interaction to spread, while worms are self-replicating and spread without user intervention. These differences impact countermeasures—viruses can be mitigated through user education and file scanning, while worms require network-level defenses like firewalls, intrusion detection systems, and patch management to close vulnerabilities they exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly