Computer Worms and Trojans Quiz
30 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of malware encrypts the data on your hard drive and demands a ransom for decryption?

  • Trojan
  • Worm
  • Spyware
  • Ransomware (correct)
  • Which type of malware hides inside a useful program and performs operations in the background without the user's knowledge?

  • Trojan (correct)
  • Botnet
  • Spyware
  • Worm
  • What is the main consequence of worms replicating on a host computer?

  • Consuming hard disk space (correct)
  • Data encryption
  • Keystroke recording
  • Creating backdoor access
  • Which malware may record keystrokes to collect sensitive data?

    <p>Trojan</p> Signup and view all the answers

    What does a botnet consist of in the context of cyber attacks?

    <p>A series of computers</p> Signup and view all the answers

    How is ransom often demanded in ransomware attacks?

    <p>In bitcoins</p> Signup and view all the answers

    What is the purpose of a cache controller in a computer system?

    <p>To store data for future use</p> Signup and view all the answers

    Which level of cache is integrated into the CPU and runs at the full core speed of the CPU?

    <p>Level 1 (L1) cache</p> Signup and view all the answers

    What is the approximate size range of Level 2 (L2) cache in modern computers?

    <p>1MB</p> Signup and view all the answers

    Where does the Level 3 (L3) cache typically reside?

    <p>On the CPU</p> Signup and view all the answers

    In terms of speed, how does Level 2 (L2) cache operate in relation to the processor?

    <p>Runs at full processor speed</p> Signup and view all the answers

    What is a key performance factor related to the CPU, as mentioned in the text?

    <p>CPU clock speed</p> Signup and view all the answers

    Which type of RAM requires constant refreshing by the memory controller?

    <p>Dynamic RAM (DRAM)</p> Signup and view all the answers

    What is the main function of a heatsink?

    <p>To prevent the CPU from overheating</p> Signup and view all the answers

    Which type of memory is used to store permanent, or semi-permanent data that persists even while the system is off?

    <p>Read Only Memory (ROM)</p> Signup and view all the answers

    Which type of ROM chip can be altered after being written to?

    <p>Electrically Erasable Programmable Read Only Memory (EEPROM)</p> Signup and view all the answers

    Which type of memory maintains its contents for as long as power is applied?

    <p>Static RAM (SRAM)</p> Signup and view all the answers

    Which type of memory is considered to be lower in density, larger but more expensive than a comparable DRAM chip?

    <p>Static RAM (SRAM)</p> Signup and view all the answers

    What tab is used to insert a chart in MS Excel?

    <p>Insert tab</p> Signup and view all the answers

    Which operator is used for exponentiation in MS Excel formulas?

    <p>^</p> Signup and view all the answers

    What data type is used to store numerical data in MS Excel?

    <p>IEEE-754 Double Precision</p> Signup and view all the answers

    What tab is used to format data and apply general-purpose worksheet commands in MS Excel?

    <p>Home tab</p> Signup and view all the answers

    How many basic types of data are used in MS Excel?

    <p>Four</p> Signup and view all the answers

    Which tab is used to filter, sort, and validate data in MS Excel?

    <p>Data tab</p> Signup and view all the answers

    Which type of memory is not attached to the computer?

    <p>Tertiary Memory</p> Signup and view all the answers

    What is the main difference between Sequential and Direct methods of accessing secondary memory?

    <p>Speed of access</p> Signup and view all the answers

    Which type of memory serves as an extension of main memory to enhance performance?

    <p>Virtual Memory</p> Signup and view all the answers

    In computer maintenance, what is recommended to avoid for Mechanical hard drives but not for Solid-State Drives?

    <p>Defragment the Hard Drive</p> Signup and view all the answers

    What method of backup includes only the new and changed files since the last full backup?

    <p>Incremental backup</p> Signup and view all the answers

    Which type of memory involves devices like Hard Disks, Optical Drives, and Magnetic Tape?

    <p>Secondary Memory</p> Signup and view all the answers

    Study Notes

    Computer Memory Unit of Measurement

    • Various units are used to measure computer memory.

    Types of Memory

    • Primary Memory:
      • RAM (Random Access Memory)
        • Has two types: Dynamic RAM (DRAM) and Static RAM (SRAM)
        • DRAM:
          • A cell of capacitors and transistors holds a single bit of information
          • Considered to be very dense, allowing a lot of data to be stored on a small chip
          • Requires constant refreshing by the memory controller
        • SRAM:
          • Maintains its contents for as long as power is applied
          • Uses a cluster of six transistors to store a single bit
          • Considered to be lower in density, it is larger but more expensive than a comparable DRAM chip
      • ROM (Read Only Memory)
        • Does not need to be refreshed
        • Used to store permanent, or semi-permanent data that persists even while the system is off
        • Three types of ROM Chips:
          • PROM (Programmable Read Only Memory)
          • EPROM (Erasable Programmable Read Only Memory)
          • EEPROM (Electrically Erasable Programmable Read Only Memory)

    Secondary Memory

    • Where data is stored in the computer so it can be easily retrieved later
    • How caching works:
      • The cache controller anticipates what data will be required next
      • Three levels of processor cache exist in modern computers:
        • Level 1 (L1) cache:
          • Size ranges about 256KB or more
          • Integrated into the CPU
          • Runs at the full core speed of the CPU
          • Very expensive to manufacture
        • Level 2 (L2) cache:
          • Approximately 1MB of storage
          • Runs at full processor speed
          • Acts as secondary buffer between system memory and CPU
          • Also expensive to manufacture
        • Level 3 (L3) cache:
          • Resides on the CPU – some older CPU’s have it on the motherboard
          • Size of the Cache is approximately 6MB to 8MB
    • Two ways of accessing a secondary memory:
      • Sequential
      • Direct

    Types of Secondary Memory

    • Hard Disks
    • Optical Drives
    • Magnetic Tape
    • USB Thumb Drive

    Tertiary Memory

    • This type of Memory is not attached to the computer
    • Types of Tertiary Memory:
      • Cloud Storage
      • Network Attached Storage (NAS)

    Virtual Memory

    • Enhances performance by providing greater memory capacity, without the expense of adding main memory
    • Instead, a portion of a disk drive serves as an extension of main memory
    • A physical address is the actual memory address of physical memory

    Computer Maintenance

    • Avoid Overheating
    • Remove Unwanted Programs
    • Defragment the Hard Drive (can be used for Mechanical hard drives only, not Solid-State Drives)
    • Recover Wasted Disk Space
    • Disk cleanup
    • System Restore
    • Data Backups and Recovery

    Data Backups and Recovery

    • Unstructured or “one-off” Images
    • Full Differential
    • Incremental
    • Full back up of the entire structure of the hard drive including the OS
    • Full back up of the target data except the OS
    • Backup new and changed files since the last full back up

    MS Excel

    • Worksheet:
      • Contains a grid of small boxes, each box(cell) stores a piece of data
      • Columns are A - … and Rows are 1 – 1048576
      • Four basic types of data used in MS Excel: Numeric value, Text Data, A formula, An error message
    • Formula Basics:
      • Operator:
        • /
        • ^
        • &
      • Logical Operators:
        • =
        • >
        • <
        • >=
      • Worms:
        • May carry a variety of payloads and may appear to behave as a virus
        • Worms generally don’t cause any harm to their host(computer) but their replicating nature consumes hard disk space, slowing down the host computer
        • Spread through (across) vulnerable network connections or through storage media
        • Payloads are often Trojan programs
      • Trojans:
        • A Trojan is a type of virus; it “hides” inside a useful program, and performs “operations” in the background that the user is unaware of
        • May record keystrokes to collect passwords or other sensitive data or load malicious software
        • Take advantage of security holes and create a means for remote users to control the computer (backdoor access)
      • Ransomware:
        • A type of malware; it encrypts the data on your hard drive/backup devices and prevents you from using your computer
        • It is a tool that can be used by governments to attack the infrastructure of another country
        • To unencrypt your computer, you often have to pay a “ransom”
        • Often payment is demanded/made in bitcoins, a digital currency
      • Spyware:
        • Bots
        • Botnet (Bots) is a series of computers standing by to execute a coordinated attack against a target (i.e.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on computer worms and trojans, their behavior, impact on host computers, spreading mechanisms, and common payloads like Trojan programs. Learn about the difference between worms and trojans, and how they can affect computer systems.

    Use Quizgecko on...
    Browser
    Browser