0% found this document useful (0 votes)
285 views7 pages

CHP Quiz 2

This document contains a 20 question multiple choice test on computer viruses and anti-virus software. It provides the questions, answers chosen by "Cotto,William", feedback and points earned. The test covers topics like types of viruses, worms, anti-virus programs, and system recovery tools for different operating systems. Overall the test-taker answered 14 questions correctly out of 20 for a score of 70%.

Uploaded by

Enigma2u
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
285 views7 pages

CHP Quiz 2

This document contains a 20 question multiple choice test on computer viruses and anti-virus software. It provides the questions, answers chosen by "Cotto,William", feedback and points earned. The test covers topics like types of viruses, worms, anti-virus programs, and system recovery tools for different operating systems. Overall the test-taker answered 14 questions correctly out of 20 for a score of 70%.

Uploaded by

Enigma2u
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Test 2

Page 1 of 7

Submitted by Cotto,William on 10/9/2013 10:26:30 PM Points Awarded 14.00 Points Missed Percentage 6.00 70.0%

1. How many days of the month does the Code Red worm replicate? A) 15 B) 19 Feedback: Correct. C) 23 D) 29 Correct Answer(s): B

3. Backdoor.Egghead is an example of a worm that is spread by buffer overflows. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 0.0/1.0 Correct Answer(s): False

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013

PD

Correct Answer(s): B

Fi

Points Earned:

1.0/1.0

ll P

C) macro D) multipartite

DF

Ed

ito

2. A _____ virus appends to program files such as system files, executable files, driver files, and supplementary files, including .dlls. A) partition sector B) file infector Feedback: Correct.

rw

ith

Fr ee

rit

er an d

To

ols

Points Earned:

1.0/1.0

Test 2

Page 2 of 7

4. What was one reason the Slammer worm was successful against SQL Server database servers in early 2003? A) It gained access through a previously unknown vulnerability in SQL server B) Many administrators had not installed new patches designed to block this attack Feedback: Correct. C) It was a polymorphic worm that rapidly changed signatures D) It was a stealth worm that was difficult to detect Points Earned: 1.0/1.0 Correct Answer(s): B

6. Which of the following is an example of a Red Hat Linux file that can be the target of a virus? A) autoexec.bat B) inittab Feedback: Correct. C) startup.ncf D) win.ini Points Earned: 1.0/1.0 Correct Answer(s): B

7. In Red Hat Linux, what mode do you need to be in to run the fdisk/mbr utility which replaces the MBR?

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013

PD

Fi

ll P

DF

Ed

Correct Answer(s): False

ito

Points Earned:

1.0/1.0

rw

ith

Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect.

Fr ee

rit

er an d

5. Can the VCatch Basic Anti-virus program be used both in Windows and Linux environments? A) True B) False

To

ols

Test 2

Page 3 of 7

A) Safe B) Rescue Feedback: Correct. C) Recovery D) MBR Points Earned: 1.0/1.0 Correct Answer(s): B

8. Software exploitation is particularly aimed at new software and new software versions. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Correct Answer(s): True

C) win.ini D) Both a and b Points Earned: 0.0/1.0 Correct Answer(s): D

10.

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013

PD

Fi

ll P

9. Which of the following is an example of a Netware 6.x file that can be the target of a virus? A) autoexec.bat B) startup.ncf Feedback: Incorrect.

DF

Ed

ito

rw

ith

Fr ee

Points Earned:

1.0/1.0

rit

er an d

To

ols

Test 2

Page 4 of 7

11. The first stage of virus spread that occurs is replication within the infected system. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 0.0/1.0 Correct Answer(s): False

12. Which anti-virus software is available for use on Macintosh, NetWare, UNIX/Linux, and Windowsbased systems? A) AntiVir Personal Edition B) HandyBits VirusScan

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013

PD

Fi

ll P

DF

Ed

ito

Correct Answer(s): B

rw

Points Earned:

1.0/1.0

ith

C) Mac OS X Software Update Tool D) None of the above

Fr ee

What is displayed in the figure above? A) Windows Update Setup Wizard B) Red Hat Network Alert Notification Tool Feedback: Correct.

rit

er an d

To

ols

Test 2

Page 5 of 7

C) McAfee VirusScan D) Sophos Anti-Virus Feedback: Correct. Points Earned: 1.0/1.0 Correct Answer(s): D

13. The W32.Pinfi virus is an example of a destructive virus that can infect Mac OS systems. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 0.0/1.0 Correct Answer(s): False

Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True

15. Does Windows 2000 use an ASR set to recover from a system failure? A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect.

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013

PD

Fi

ll P

DF

14. Should you create a new ASR set each time you add a protocol or install a new driver for a network interface card? A) True B) False

Ed

ito

rw

ith

Fr ee

rit

er an d

To

ols

Test 2

Page 6 of 7

Points Earned:

1.0/1.0

Correct Answer(s): False

16. Which of the following operating systems uses an emergency repair disk? A) Windows 2000 Server B) Windows 2000 Pro C) Windows XP Pro D) Windows 2003 Server Feedback: Incorrect. E) Both a and b Points Earned: 0.0/1.0 Correct Answer(s): E

18. The Code Red worm replicates for the first 23 days of the month and then stops. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False

19. A(n) boot sector virus typically infects or replaces the instructions in the MBR or the Partition Boot Sector.

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013

PD

Fi

ll P

DF

Points Earned: 1.0/1.0 Correct Answer(s): B

Ed

ito

C) 3 D) 4

rw

ith

Fr ee

17. How many copies of the ASR set should you have for a server? A) 1 B) 2 Feedback: Correct.

rit

er an d

To

ols

Test 2

Page 7 of 7

A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True

B) multipartite C) macro D) file infector Points Earned: 0.0/1.0 Correct Answer(s): B

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013

PD

Fi

ll P

DF

Continue

Ed

ito

rw

ith

Fr ee

rit

er an d

20. A _____ virus can infect systems through multiple means, particularly through boot or partition sectors and through executable files. A) boot sector Feedback: Incorrect.

To

ols

You might also like