We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
Test Bank
Chapter 6
Computer Security Principles and Practice
3rd Edition Stallings
http://testhankdata.com/download/2185
Thanks to MSC IT student Dhuha Tawfeeq Ahashemi for providing all these papers
Collected by
MSc IT student Ahmed Qasim
Altinbas University
2020
CamScanner + luis a susallComputer Security: Principles and Practice, 3" Edition Chapter 6
Se
Chapter 6 — Malicious Software
TRUE/FALSE QUESTIONS:
Be Seo ae gape Sorgen ss
aren Bio ee Le ott
i... Malicious $01 yare ears to trick users into revealing sensitive personal data
é# oo connie
2 feystrokes on a .
y C2>
Sa ee pe
GG > ahasammntgcode is sSnvare hat Sie ‘Fifedighangsing
“helrqgeneguscoflegion of platforms and execute with idemtealsempaptis.
aoe: se
SNe ae?
@ S@ 4, A virus that SifteHes to anexecytable pittitin can do anything that the
program is peed to doe Bees
none
& ¢ 5. It is not possible to spread a virus via an USBesticky USE ecicls dks
6 atta Pcp ad 2 ae
6 6A logic bomb is, the event or condition that deteftitines‘when the payload is
ase YS activated or delivered.
yd Qed eared) Lao he uth ib?
7. Many forms of infection can be blocked by denying normal users the right to
go 0 ¢ Gélee modify programs on the system. gaat
eS 6s 8, pSEMMERONNRAR infects executable portions of code, bad Jaci Ah cags
F BD G > Ermilisa Sinknon Weld for spreading macro viruses. 1
GG wh NEN NO ting, Poh iatbliy Skies Sine yer aa
é GF GF _ 11. A Trjanhorse is an apparently useful program containing hidden code that,
33 when invoked, performs some harmful function.
e @ 12. Packet sniffers are mostly used to retrieve sensitive information like
usernames and passwords.
gee ery Ss
e @ 13, SabRpafagnesiseamaniitessiely whereas a worm snially
contol fom se ceil gly aoe. Cae
Joie
< ois Every bot has a. aignct IP address.
GE SW 15. Programmers use backdoors to debug and test programs.
ES ae we Era
CamScanner 3 li92 4>g.uaall—_
Computer Security: Principles and Practice, 3" Edition Chapter 6
MULTIPLE CHOICE QUESTION:
1. A program that is covertly inserted into a system with the intent of compromising the
integrity or confidentiality of the victim's data is
‘
‘oar,
are used to send large volumes of unwanted e-mail,
‘aT
PSA
il
[!
3A is code inserted into malware that lies dormant until a predefined
condition, which triggers an unauthorized act, is met.
“Feces
SF io
4. The term “computer virus” is attributed to
T
it
“XS vtermmmestoitomtt,
“Creams
5. Computer viruses first appeared in the early
6. The is what the virus “does”.
i
itty
7, The is when the virus function is performed.
8. During the the virus is idle.
I
(TI
CamScanner 2 li92 4>g.uaallComputer Security: Principles and Practice, 3 Edition Chapter 6
9A uses macro or scripting code, typically embedded in a document and
triggered when the document is viewed or edited, to run and replicate itself into other
such documents.
A CREE — TELE
em Cape
10. is the first function in the propagation phase for a network worm.
11, Unsolicited.bulk e-maihis referred to as
e
12. is malware that encrypts the user’s data and demands payment in order to
access the key needed to recover the information.
13. A attack is a bot attack on a computer system or network that causes a loss
of service to users.
14, The ideal solution to the threat of malware is
A. identification eaeom) 2
‘exten Gram
15. ‘will integrate with the operating system of a host computer and monitor
program behavior in real time for malicious actions. ok
A. Fingerprint-based scames (AP
D. Heuristic scanners
es ieee
CamScanner 3 bi92 4>g.uaallComputer Security: Principles and Practice, 3" Edition Chapter 6
SHORT ANSWER QUESTIONS:
1, A dqummgat is a set of programs installed on a system to maintain covert access to that
system with administrator (root) privileges while hiding evidence of its presence.
2A uses multiple methods 0
speed of contagion and the severity of the attack.
fection or propagation to maximize the
3. A computer is a piece of software that cari “infect” other programs or any type of
executable content and tries to replicate itself. aes
4, Sometimes referred to as the “infection vector”, thc ie js the means
by which a virus spreads or propagates.
5. Sometimes known as a “logic bob", the goa
determines when the payloads activated or delivered.
is the event or condition that
6. The four phases of a typical virus are: dormant phase, triggering phase, execution phase
and ST~ phase.
7. During the Sly phase the virus is activated to perform the function for which it
was intended.
8. A ili virus is explicitly designed to hide itself from detection by anti-virus
software. . .
9. SBEEMPcode refers to programs that can be shipped unchanged to a heterogeneous
collection of platforms and execute with identical semantics.
10, A GAMEMENRNREAD is when a user views a Web page controlled by the attacker that
contains a code that exploits the brovwser bug and downloads and installs malware on the
system without the user’s knowledge or consent.
11. A Sammmmp is a collection of bots capable of acting in a coordinated manner.
5 1
12. A bot can use a Simm to capture keystrokes on the infected machine to retrieve
sensitive information. ‘
13. Countermeasures for malware are generally known as gaggle mechanisms because
they were first developed to specifically target virus infections.
CamScanner 3 li92 4>g.uaallComputer Security: Principles and Practice, 3° Edition Chapter 6
‘QP? Developed by IBM and refined by Symantec, the CET provides a
‘malware detection system that will automatically capture, analyze, add detection and
shielding, or remove new malware and pass information about it to client systems so the
malware can be detected before it is allowed to run elsewhere.
em tc1n0102y is an anti-virus approach that enables the anti-
virus program to easily detect even the most complex polymorphic viruses and other
malware, while maintaining fast scanning speeds,
CamScanner 3 li92 4>g.uaallTRUE/FALSE CHE
MULTIPLE CHOICE
et
BONB>BN>OOOe>e
SHORT ANSWERS
1. Rootkit
2. Blended attack
3 Virus
4- Infection mechani
5+ Trigger
6 Propagation
7 Triggering
8 Stealth
9- Mobile
10- Drive-by-download
11- Botnet
12- Keylogger
13 Anti-virus
14- Digital immune system
15- Generic decryption (GD)
CamScanner 3 li92 4>g.uaall