Info
Warning
Danger
/ Homework Answers / Computer Science / 1. The most common way for a virus to spread

Question

 

1. The most common way for a virus to spread is by __________.

a. Use of your email contacts

b. Scanning your computer for network connections and copying itself to other machines on the network

c. Locating Linux machines

d. None of the above

2. The Microsoft Office suite is a tempting target for viruses because ___________.

a. It is so ubiquitous.

b. It is designed so that legitimate programmers can access its internal objects.

c. It contains virus programming tools.

d. None of the above.

3. The I Love You virus caused harm because ________.

a. It had a negative payload.

b. It erased data on computers.

c. It generated large numbers of emails that bogged down many networks.

d. None of the above.

4. The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.

a. W32/Netsky-P

b. Troj/Invo-Zip

c. MacDefender

d. Sobig

5.  The virus/worm transmitted in a zip file attached to an email with an enticing message is __________.

a. W32/Netsky-P

b. Troj/Invo-Zip

c. MacDefender

d. None of the above

6. The virus/worm that specifically targets Macintosh computers is ________.

a. W32/Netsky-P

b. Troj/Invo-Zip

c. MacDefender

d. None of the above

7. The virus/worm that specifically targets Linux computers is ________.

a. W32/Netsky-P

b. Troj/Invo-Zip

c. MacDefender

d. None of the above

8.  The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.

a. Mimail

b. Bagle

c. Nonvirus

d. None of the above

9.  The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.

a. Mimail

b. Bagle

c. Nonvirus

d. None of the above

10. The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.

a. Mimail

b. Bagle

c. Nonvirus

d. None of the above

11. A program that looks benign but actually has a malicious purpose is a _______.

a. Trojan horse

b. Virus

c. Worm

d. Cookie

12. McAfee and Norton are examples of ________.

a. Viruses

b. Worms

c. Trojan horses

d. Virus scanners

13. A program that can propagate without human interference is a _______.

a. Virus

b. Worm

c. Trojan horse

d. None of the above

14. Any file that can self-replicate is a ________.

a. Virus

b. Worm

c. Trojan horse

d. None of the above

15.  If a program writes more information into the computer’s memory than the memory was designed to hold, it is a(n) ___________ attack.

a. Buffer-overflow

b. RAM

c. Spyware

d. Adware

 

 

 

Solution
5 (1 Ratings )

Solved
Computer Science 1 Month Ago 4 Views
This Question has Been Answered!
Premium Content -