Filters
Question type

Study Flashcards

With which attachment was the Resume virus associated?


A) Explorer.exe
B) Explorer.msi
C) Explorer.doc
D) Explorer.com

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Is Windows the only operating system that is vulnerable to a macro virus?

A) True
B) False

Correct Answer

verifed

verified

A(n) _____ virus changes each time it is replicated, making it more difficult to create a defense against it.


A) armored
B) multipartite
C) polymorphic
D) heuristic

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following virus programs is available for purchase on a Windows-based workstation?


A) AntiVir Personal Edition
B) Handybits Viruscan
C) VCatch Basic
D) Sophos Anti-virus
E) Both b and d

F) None of the above
G) A) and C)

Correct Answer

verifed

verified

The first stage of virus spread that occurs is replication within the infected system.

A) True
B) False

Correct Answer

verifed

verified

Is one advantage of a digital signature that it helps ensure the security of your system by allowing only drivers and system files that have been verified by Microsoft?

A) True
B) False

Correct Answer

verifed

verified

The _____ virus can only become destructive if the user executes an infected file on a Friday the thirteenth.


A) Linux.Millen.Worm
B) INIT 1984
C) W32.Pinfi
D) Code Red II

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

B

Software exploitation is particularly aimed at new software and new software versions.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ is a program that replicates and replicates on the same computer, or one that sends itself to many other computers on a network or the Internet.

Correct Answer

verifed

verified

What basic steps should be taken to protect an operating system from malicious software?

Correct Answer

verifed

verified

1. Installing updates 2. Viewing what is loaded when a system is booted 3. Using malicious software scanners 4. Using digital signatures for system and driver files 5. Backing up systems and creating repair disks 6. Creating and implementing organizational policies

In the ____________________ operating system, you can display the boot process by booting into either single user mode or verbose mode.

Correct Answer

verifed

verified

Which anti-virus software is available for use on only Windows and Mac OS systems?


A) Central Command Vexira AntiVirus
B) F-Prot AV
C) Norton AntiVirus
D) McAfee VirusScan
E) Both c and d

F) B) and C)
G) A) and C)

Correct Answer

verifed

verified

The Code Red worm replicates for the first 23 days of the month and then stops.

A) True
B) False

Correct Answer

verifed

verified

A _____ virus appends to program files such as system files, executable files, driver files, and supplementary files, including .dlls.


A) partition sector
B) file infector
C) macro
D) multipartite

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

List eight examples of executable-type file extensions and the operating systems that use them..

Correct Answer

verifed

verified

Any eight of the following:
1. .exe (for...

View Answer

In its destructive mode, will the INIT 1984 virus rename files using random characters and delete files on hard drives?

A) True
B) False

Correct Answer

verifed

verified

Which anti-virus software is available for use on Macintosh, NetWare, UNIX/Linux, and Windows-based systems?


A) AntiVir Personal Edition
B) HandyBits VirusScan
C) McAfee VirusScan
D) Sophos Anti-Virus

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions.

Premises
A set of instructions used to find and load the operating system
A removable disk used to boot an operating system
Captures information about cookies sent between a Web server and a client
The beginning of a disk where code to start up the operating system is stored
In Windows 2000, a disk that contains repair and backup information
The process of placing a digital signature in a device driver
A code that is placed in a file to verify its authenticity
Information that a Web server stores on a client computer
A secret avenue into an operating system that bypasses normal security
Backup media needed to start a failed Windows XP Pro system
Responses
back door
boot sector
driver signing
ASR Set
cookie
ERD
MBR
boot disk
digital signature
spyware

Correct Answer

A set of instructions used to find and load the operating system
MBR
A removable disk used to boot an operating system
boot disk
Captures information about cookies sent between a Web server and a client
spyware
The beginning of a disk where code to start up the operating system is stored
boot sector
In Windows 2000, a disk that contains repair and backup information
ERD
The process of placing a digital signature in a device driver
driver signing
A code that is placed in a file to verify its authenticity
digital signature
Information that a Web server stores on a client computer
cookie
A secret avenue into an operating system that bypasses normal security
back door
Backup media needed to start a failed Windows XP Pro system
ASR Set

The W32.Pinfi virus is an example of a destructive virus that can infect Mac OS systems.

A) True
B) False

Correct Answer

verifed

verified

A(n) stealth virus uses defenses to make itself hard to find and detect.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 86

Related Exams

Show Answer