0% found this document useful (0 votes)
246 views7 pages

Test Bank 6

Uploaded by

mustafa albayati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
246 views7 pages

Test Bank 6

Uploaded by

mustafa albayati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
Test Bank Chapter 6 Computer Security Principles and Practice 3rd Edition Stallings http://testhankdata.com/download/2185 Thanks to MSC IT student Dhuha Tawfeeq Ahashemi for providing all these papers Collected by MSc IT student Ahmed Qasim Altinbas University 2020 CamScanner + luis a susall Computer Security: Principles and Practice, 3" Edition Chapter 6 Se Chapter 6 — Malicious Software TRUE/FALSE QUESTIONS: Be Seo ae gape Sorgen ss aren Bio ee Le ott i... Malicious $01 yare ears to trick users into revealing sensitive personal data é# oo connie 2 feystrokes on a . y C2> Sa ee pe GG > ahasammntgcode is sSnvare hat Sie ‘Fifedighangsing “helrqgeneguscoflegion of platforms and execute with idemtealsempaptis. aoe: se SNe ae? @ S@ 4, A virus that SifteHes to anexecytable pittitin can do anything that the program is peed to doe Bees none & ¢ 5. It is not possible to spread a virus via an USBesticky USE ecicls dks 6 atta Pcp ad 2 ae 6 6A logic bomb is, the event or condition that deteftitines‘when the payload is ase YS activated or delivered. yd Qed eared) Lao he uth ib? 7. Many forms of infection can be blocked by denying normal users the right to go 0 ¢ Gélee modify programs on the system. gaat eS 6s 8, pSEMMERONNRAR infects executable portions of code, bad Jaci Ah cags F BD G > Ermilisa Sinknon Weld for spreading macro viruses. 1 GG wh NEN NO ting, Poh iatbliy Skies Sine yer aa é GF GF _ 11. A Trjanhorse is an apparently useful program containing hidden code that, 33 when invoked, performs some harmful function. e @ 12. Packet sniffers are mostly used to retrieve sensitive information like usernames and passwords. gee ery Ss e @ 13, SabRpafagnesiseamaniitessiely whereas a worm snially contol fom se ceil gly aoe. Cae Joie < ois Every bot has a. aignct IP address. GE SW 15. Programmers use backdoors to debug and test programs. ES ae we Era CamScanner 3 li92 4>g.uaall —_ Computer Security: Principles and Practice, 3" Edition Chapter 6 MULTIPLE CHOICE QUESTION: 1. A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is ‘ ‘oar, are used to send large volumes of unwanted e-mail, ‘aT PSA il [! 3A is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met. “Feces SF io 4. The term “computer virus” is attributed to T it “XS vtermmmestoitomtt, “Creams 5. Computer viruses first appeared in the early 6. The is what the virus “does”. i itty 7, The is when the virus function is performed. 8. During the the virus is idle. I (TI CamScanner 2 li92 4>g.uaall Computer Security: Principles and Practice, 3 Edition Chapter 6 9A uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents. A CREE — TELE em Cape 10. is the first function in the propagation phase for a network worm. 11, Unsolicited.bulk e-maihis referred to as e 12. is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information. 13. A attack is a bot attack on a computer system or network that causes a loss of service to users. 14, The ideal solution to the threat of malware is A. identification eaeom) 2 ‘exten Gram 15. ‘will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions. ok A. Fingerprint-based scames (AP D. Heuristic scanners es ieee CamScanner 3 bi92 4>g.uaall Computer Security: Principles and Practice, 3" Edition Chapter 6 SHORT ANSWER QUESTIONS: 1, A dqummgat is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence. 2A uses multiple methods 0 speed of contagion and the severity of the attack. fection or propagation to maximize the 3. A computer is a piece of software that cari “infect” other programs or any type of executable content and tries to replicate itself. aes 4, Sometimes referred to as the “infection vector”, thc ie js the means by which a virus spreads or propagates. 5. Sometimes known as a “logic bob", the goa determines when the payloads activated or delivered. is the event or condition that 6. The four phases of a typical virus are: dormant phase, triggering phase, execution phase and ST~ phase. 7. During the Sly phase the virus is activated to perform the function for which it was intended. 8. A ili virus is explicitly designed to hide itself from detection by anti-virus software. . . 9. SBEEMPcode refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. 10, A GAMEMENRNREAD is when a user views a Web page controlled by the attacker that contains a code that exploits the brovwser bug and downloads and installs malware on the system without the user’s knowledge or consent. 11. A Sammmmp is a collection of bots capable of acting in a coordinated manner. 5 1 12. A bot can use a Simm to capture keystrokes on the infected machine to retrieve sensitive information. ‘ 13. Countermeasures for malware are generally known as gaggle mechanisms because they were first developed to specifically target virus infections. CamScanner 3 li92 4>g.uaall Computer Security: Principles and Practice, 3° Edition Chapter 6 ‘QP? Developed by IBM and refined by Symantec, the CET provides a ‘malware detection system that will automatically capture, analyze, add detection and shielding, or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere. em tc1n0102y is an anti-virus approach that enables the anti- virus program to easily detect even the most complex polymorphic viruses and other malware, while maintaining fast scanning speeds, CamScanner 3 li92 4>g.uaall TRUE/FALSE CHE MULTIPLE CHOICE et BONB>BN>OOOe>e SHORT ANSWERS 1. Rootkit 2. Blended attack 3 Virus 4- Infection mechani 5+ Trigger 6 Propagation 7 Triggering 8 Stealth 9- Mobile 10- Drive-by-download 11- Botnet 12- Keylogger 13 Anti-virus 14- Digital immune system 15- Generic decryption (GD) CamScanner 3 li92 4>g.uaall

You might also like