Questions and Answers
True or false: Malware is a new phenomenon.
False
True or false: Fred Cohen's initial virus work occurred in the 1980s.
True
True or false: Viruses only propagate passively.
False
True or false: Worms propagate actively.
Signup and view all the answers
True or false: Trojan horse malware provides unexpected functionality.
Signup and view all the answers
True or false: Trapdoor/backdoor malware provides authorized access.
Signup and view all the answers
True or false: Rabbit malware exhausts system resources.
Signup and view all the answers
True or false: Viruses can live in the boot sector.
Signup and view all the answers
True or false: Memory resident malware stays in memory.
Signup and view all the answers
True or false: Library routines such as compilers and debuggers can contain malware.
Signup and view all the answers
True or false: Code Red Worm infected more than 250,000 systems in about 15 hours?
Signup and view all the answers
True or false: Code Red Worm exploited buffer overflow in Microsoft IIS server software?
Signup and view all the answers
True or false: Trojan Horse Example involved unexpected functionality?
Signup and view all the answers
True or false: freeMusic.mp3 trojan is harmless?
Signup and view all the answers
True or false: Signature Detection is the most popular malware detection method?
Signup and view all the answers
True or false: Change Detection can even detect previously unknown malware?
Signup and view all the answers
True or false: Anomaly Detection has a proven track record?
Signup and view all the answers
True or false: Encrypted viruses can evade signature detection?
Signup and view all the answers
True or false: Different copies of encrypted viruses have a common signature?
Signup and view all the answers
True or false: Encryption is not often used in viruses today?
Signup and view all the answers
True or false: Encryption of the decryptor code is of limited value to virus writers?
Signup and view all the answers
True or false: The Flash Worm is designed to infect the entire Internet almost instantly?
Signup and view all the answers
True or false: The Flash Worm replicates and splits, resulting in no wasted time or bandwidth?
Signup and view all the answers
True or false: It is estimated that an ideal Flash Worm could infect the entire Internet in 15 seconds?
Signup and view all the answers
True or false: Botnets are networks of infected machines controlled by a botmaster?
Signup and view all the answers
True or false: XtremBot is an example of a botnet that is highly modular and easily modified?
Signup and view all the answers
True or false: Mariposa was used to steal credit card info and its creator was arrested in July 2010?
Signup and view all the answers
True or false: Malware today outnumbers 'goodware' and there are many virus toolkits available?
Signup and view all the answers
True or false: It may be better to 'detect' good code by using a whitelist instead of a blacklist?
Signup and view all the answers
True or false: The text mentions 10 examples of malware?
Signup and view all the answers
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.