Computer Worms and Trojans Quiz

FragrantBarbizonSchool avatar
FragrantBarbizonSchool
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What type of malware encrypts the data on your hard drive and demands a ransom for decryption?

Ransomware

Which type of malware hides inside a useful program and performs operations in the background without the user's knowledge?

Trojan

What is the main consequence of worms replicating on a host computer?

Consuming hard disk space

Which malware may record keystrokes to collect sensitive data?

Trojan

What does a botnet consist of in the context of cyber attacks?

A series of computers

How is ransom often demanded in ransomware attacks?

In bitcoins

What is the purpose of a cache controller in a computer system?

To store data for future use

Which level of cache is integrated into the CPU and runs at the full core speed of the CPU?

Level 1 (L1) cache

What is the approximate size range of Level 2 (L2) cache in modern computers?

1MB

Where does the Level 3 (L3) cache typically reside?

On the CPU

In terms of speed, how does Level 2 (L2) cache operate in relation to the processor?

Runs at full processor speed

What is a key performance factor related to the CPU, as mentioned in the text?

CPU clock speed

Which type of RAM requires constant refreshing by the memory controller?

Dynamic RAM (DRAM)

What is the main function of a heatsink?

To prevent the CPU from overheating

Which type of memory is used to store permanent, or semi-permanent data that persists even while the system is off?

Read Only Memory (ROM)

Which type of ROM chip can be altered after being written to?

Electrically Erasable Programmable Read Only Memory (EEPROM)

Which type of memory maintains its contents for as long as power is applied?

Static RAM (SRAM)

Which type of memory is considered to be lower in density, larger but more expensive than a comparable DRAM chip?

Static RAM (SRAM)

What tab is used to insert a chart in MS Excel?

Insert tab

Which operator is used for exponentiation in MS Excel formulas?

^

What data type is used to store numerical data in MS Excel?

IEEE-754 Double Precision

What tab is used to format data and apply general-purpose worksheet commands in MS Excel?

Home tab

How many basic types of data are used in MS Excel?

Four

Which tab is used to filter, sort, and validate data in MS Excel?

Data tab

Which type of memory is not attached to the computer?

Tertiary Memory

What is the main difference between Sequential and Direct methods of accessing secondary memory?

Speed of access

Which type of memory serves as an extension of main memory to enhance performance?

Virtual Memory

In computer maintenance, what is recommended to avoid for Mechanical hard drives but not for Solid-State Drives?

Defragment the Hard Drive

What method of backup includes only the new and changed files since the last full backup?

Incremental backup

Which type of memory involves devices like Hard Disks, Optical Drives, and Magnetic Tape?

Secondary Memory

Study Notes

Computer Memory Unit of Measurement

  • Various units are used to measure computer memory.

Types of Memory

  • Primary Memory:
    • RAM (Random Access Memory)
      • Has two types: Dynamic RAM (DRAM) and Static RAM (SRAM)
      • DRAM:
        • A cell of capacitors and transistors holds a single bit of information
        • Considered to be very dense, allowing a lot of data to be stored on a small chip
        • Requires constant refreshing by the memory controller
      • SRAM:
        • Maintains its contents for as long as power is applied
        • Uses a cluster of six transistors to store a single bit
        • Considered to be lower in density, it is larger but more expensive than a comparable DRAM chip
    • ROM (Read Only Memory)
      • Does not need to be refreshed
      • Used to store permanent, or semi-permanent data that persists even while the system is off
      • Three types of ROM Chips:
        • PROM (Programmable Read Only Memory)
        • EPROM (Erasable Programmable Read Only Memory)
        • EEPROM (Electrically Erasable Programmable Read Only Memory)

Secondary Memory

  • Where data is stored in the computer so it can be easily retrieved later
  • How caching works:
    • The cache controller anticipates what data will be required next
    • Three levels of processor cache exist in modern computers:
      • Level 1 (L1) cache:
        • Size ranges about 256KB or more
        • Integrated into the CPU
        • Runs at the full core speed of the CPU
        • Very expensive to manufacture
      • Level 2 (L2) cache:
        • Approximately 1MB of storage
        • Runs at full processor speed
        • Acts as secondary buffer between system memory and CPU
        • Also expensive to manufacture
      • Level 3 (L3) cache:
        • Resides on the CPU – some older CPU’s have it on the motherboard
        • Size of the Cache is approximately 6MB to 8MB
  • Two ways of accessing a secondary memory:
    • Sequential
    • Direct

Types of Secondary Memory

  • Hard Disks
  • Optical Drives
  • Magnetic Tape
  • USB Thumb Drive

Tertiary Memory

  • This type of Memory is not attached to the computer
  • Types of Tertiary Memory:
    • Cloud Storage
    • Network Attached Storage (NAS)

Virtual Memory

  • Enhances performance by providing greater memory capacity, without the expense of adding main memory
  • Instead, a portion of a disk drive serves as an extension of main memory
  • A physical address is the actual memory address of physical memory

Computer Maintenance

  • Avoid Overheating
  • Remove Unwanted Programs
  • Defragment the Hard Drive (can be used for Mechanical hard drives only, not Solid-State Drives)
  • Recover Wasted Disk Space
  • Disk cleanup
  • System Restore
  • Data Backups and Recovery

Data Backups and Recovery

  • Unstructured or “one-off” Images
  • Full Differential
  • Incremental
  • Full back up of the entire structure of the hard drive including the OS
  • Full back up of the target data except the OS
  • Backup new and changed files since the last full back up

MS Excel

  • Worksheet:
    • Contains a grid of small boxes, each box(cell) stores a piece of data
    • Columns are A - … and Rows are 1 – 1048576
    • Four basic types of data used in MS Excel: Numeric value, Text Data, A formula, An error message
  • Formula Basics:
    • Operator:
      • /
      • ^
      • &
    • Logical Operators:
      • =
      • >
      • <
      • >=
    • Worms:
      • May carry a variety of payloads and may appear to behave as a virus
      • Worms generally don’t cause any harm to their host(computer) but their replicating nature consumes hard disk space, slowing down the host computer
      • Spread through (across) vulnerable network connections or through storage media
      • Payloads are often Trojan programs
    • Trojans:
      • A Trojan is a type of virus; it “hides” inside a useful program, and performs “operations” in the background that the user is unaware of
      • May record keystrokes to collect passwords or other sensitive data or load malicious software
      • Take advantage of security holes and create a means for remote users to control the computer (backdoor access)
    • Ransomware:
      • A type of malware; it encrypts the data on your hard drive/backup devices and prevents you from using your computer
      • It is a tool that can be used by governments to attack the infrastructure of another country
      • To unencrypt your computer, you often have to pay a “ransom”
      • Often payment is demanded/made in bitcoins, a digital currency
    • Spyware:
      • Bots
      • Botnet (Bots) is a series of computers standing by to execute a coordinated attack against a target (i.e.

Test your knowledge on computer worms and trojans, their behavior, impact on host computers, spreading mechanisms, and common payloads like Trojan programs. Learn about the difference between worms and trojans, and how they can affect computer systems.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser