Mastering Malware
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

True or false: Malware is a new phenomenon.

False (B)

True or false: Fred Cohen's initial virus work occurred in the 1980s.

True (A)

True or false: Viruses only propagate passively.

False (B)

True or false: Worms propagate actively.

<p>True (A)</p> Signup and view all the answers

True or false: Trojan horse malware provides unexpected functionality.

<p>True (A)</p> Signup and view all the answers

True or false: Trapdoor/backdoor malware provides authorized access.

<p>False (B)</p> Signup and view all the answers

True or false: Rabbit malware exhausts system resources.

<p>True (A)</p> Signup and view all the answers

True or false: Viruses can live in the boot sector.

<p>True (A)</p> Signup and view all the answers

True or false: Memory resident malware stays in memory.

<p>True (A)</p> Signup and view all the answers

True or false: Library routines such as compilers and debuggers can contain malware.

<p>True (A)</p> Signup and view all the answers

True or false: Code Red Worm infected more than 250,000 systems in about 15 hours?

<p>True (A)</p> Signup and view all the answers

True or false: Code Red Worm exploited buffer overflow in Microsoft IIS server software?

<p>True (A)</p> Signup and view all the answers

True or false: Trojan Horse Example involved unexpected functionality?

<p>True (A)</p> Signup and view all the answers

True or false: freeMusic.mp3 trojan is harmless?

<p>True (A)</p> Signup and view all the answers

True or false: Signature Detection is the most popular malware detection method?

<p>True (A)</p> Signup and view all the answers

True or false: Change Detection can even detect previously unknown malware?

<p>True (A)</p> Signup and view all the answers

True or false: Anomaly Detection has a proven track record?

<p>False (B)</p> Signup and view all the answers

True or false: Encrypted viruses can evade signature detection?

<p>True (A)</p> Signup and view all the answers

True or false: Different copies of encrypted viruses have a common signature?

<p>False (B)</p> Signup and view all the answers

True or false: Encryption is not often used in viruses today?

<p>False (B)</p> Signup and view all the answers

True or false: Encryption of the decryptor code is of limited value to virus writers?

<p>True (A)</p> Signup and view all the answers

True or false: The Flash Worm is designed to infect the entire Internet almost instantly?

<p>True (A)</p> Signup and view all the answers

True or false: The Flash Worm replicates and splits, resulting in no wasted time or bandwidth?

<p>True (A)</p> Signup and view all the answers

True or false: It is estimated that an ideal Flash Worm could infect the entire Internet in 15 seconds?

<p>True (A)</p> Signup and view all the answers

True or false: Botnets are networks of infected machines controlled by a botmaster?

<p>True (A)</p> Signup and view all the answers

True or false: XtremBot is an example of a botnet that is highly modular and easily modified?

<p>True (A)</p> Signup and view all the answers

True or false: Mariposa was used to steal credit card info and its creator was arrested in July 2010?

<p>True (A)</p> Signup and view all the answers

True or false: Malware today outnumbers 'goodware' and there are many virus toolkits available?

<p>True (A)</p> Signup and view all the answers

True or false: It may be better to 'detect' good code by using a whitelist instead of a blacklist?

<p>True (A)</p> Signup and view all the answers

True or false: The text mentions 10 examples of malware?

<p>False (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser