CIS133 – Chapter 3 Quiz
Unlock all answers in this set
Unlock answersquestion
____ is a general term that refers to a wide variety of damaging or annoying software programs.
answer
Malware
question
The two types of malware that have the primary objective of infecting a computer system are ____.
answer
viruses and worms
question
A(n) ____ infection injects portions of the code throughout the program's executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).
answer
Swiss cheese
question
A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.
answer
worm
question
A computer ____ is a program advertised as performing one activity but actually does something else.
answer
Trojan
question
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.
answer
rootkit
question
A ____ silently captures and stores each keystroke that a user types on the computer's keyboard.
answer
keylogger
question
____ attacks are often the means by which an attacker will perform an arbitrary code execution.
answer
Buffer overflow
question
An infected ''robot'' computer is known as a ____.
answer
zombie
question
A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.
answer
botnet
question
A botnet consisting of thousands of zombies enables an attacker to send massive amounts of spam. Some botnets can also harvest e-mail addresses. This is known as ____.
answer
spamming
question
Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. This is known as ____.
answer
denying services
question
Spyware usually performs one of the following functions on a user's computer: ____, collecting personal information, or changing computer configurations.
answer
advertising
question
____ is software that displays a fictitious warning to the user in the attempt to "scare" the user into an action, such as purchasing additional software online to fix a problem that in fact does not exist.
answer
Scareware
question
A security ____ is a general software security update intended to cover vulnerabilities that have been discovered since the program was released.
answer
patch
question
One of the first software security applications is ____ software.
answer
antivirus
question
AV software on a computer must have its ____ files regularly updated by downloads from the Internet.
answer
signature
question
A(n) ____ account is designed for everyday computing activities and allows for some settings to be modified.
answer
standard
question
One of the best defenses against attacks is to create ____ on a regular basis.
answer
data backups
question
A ____ device is similar to a portable USB hard drive except it has additional ''intelligence'' that allows all devices connected to the computer network to access it.
answer
network attached storage
question
Protecting your personal computer has become a serious challenge unless you are an advanced computer user.
answer
False
question
Most viruses can spread to other computers by themselves.
answer
False
question
To address the vulnerabilities in operating systems that are uncovered after the software has been released, software vendors usually deploy a software "fix" to address the vulnerabilities.
answer
True
question
Data backups only protect data against computer attacks.
answer
False
question
Files backed up through online services can be made available to another computer.
answer
True