Podcast
Questions and Answers
True or false: Malware is a new phenomenon.
True or false: Malware is a new phenomenon.
False (B)
True or false: Fred Cohen's initial virus work occurred in the 1980s.
True or false: Fred Cohen's initial virus work occurred in the 1980s.
True (A)
True or false: Viruses only propagate passively.
True or false: Viruses only propagate passively.
False (B)
True or false: Worms propagate actively.
True or false: Worms propagate actively.
True or false: Trojan horse malware provides unexpected functionality.
True or false: Trojan horse malware provides unexpected functionality.
True or false: Trapdoor/backdoor malware provides authorized access.
True or false: Trapdoor/backdoor malware provides authorized access.
True or false: Rabbit malware exhausts system resources.
True or false: Rabbit malware exhausts system resources.
True or false: Viruses can live in the boot sector.
True or false: Viruses can live in the boot sector.
True or false: Memory resident malware stays in memory.
True or false: Memory resident malware stays in memory.
True or false: Library routines such as compilers and debuggers can contain malware.
True or false: Library routines such as compilers and debuggers can contain malware.
True or false: Code Red Worm infected more than 250,000 systems in about 15 hours?
True or false: Code Red Worm infected more than 250,000 systems in about 15 hours?
True or false: Code Red Worm exploited buffer overflow in Microsoft IIS server software?
True or false: Code Red Worm exploited buffer overflow in Microsoft IIS server software?
True or false: Trojan Horse Example involved unexpected functionality?
True or false: Trojan Horse Example involved unexpected functionality?
True or false: freeMusic.mp3 trojan is harmless?
True or false: freeMusic.mp3 trojan is harmless?
True or false: Signature Detection is the most popular malware detection method?
True or false: Signature Detection is the most popular malware detection method?
True or false: Change Detection can even detect previously unknown malware?
True or false: Change Detection can even detect previously unknown malware?
True or false: Anomaly Detection has a proven track record?
True or false: Anomaly Detection has a proven track record?
True or false: Encrypted viruses can evade signature detection?
True or false: Encrypted viruses can evade signature detection?
True or false: Different copies of encrypted viruses have a common signature?
True or false: Different copies of encrypted viruses have a common signature?
True or false: Encryption is not often used in viruses today?
True or false: Encryption is not often used in viruses today?
True or false: Encryption of the decryptor code is of limited value to virus writers?
True or false: Encryption of the decryptor code is of limited value to virus writers?
True or false: The Flash Worm is designed to infect the entire Internet almost instantly?
True or false: The Flash Worm is designed to infect the entire Internet almost instantly?
True or false: The Flash Worm replicates and splits, resulting in no wasted time or bandwidth?
True or false: The Flash Worm replicates and splits, resulting in no wasted time or bandwidth?
True or false: It is estimated that an ideal Flash Worm could infect the entire Internet in 15 seconds?
True or false: It is estimated that an ideal Flash Worm could infect the entire Internet in 15 seconds?
True or false: Botnets are networks of infected machines controlled by a botmaster?
True or false: Botnets are networks of infected machines controlled by a botmaster?
True or false: XtremBot is an example of a botnet that is highly modular and easily modified?
True or false: XtremBot is an example of a botnet that is highly modular and easily modified?
True or false: Mariposa was used to steal credit card info and its creator was arrested in July 2010?
True or false: Mariposa was used to steal credit card info and its creator was arrested in July 2010?
True or false: Malware today outnumbers 'goodware' and there are many virus toolkits available?
True or false: Malware today outnumbers 'goodware' and there are many virus toolkits available?
True or false: It may be better to 'detect' good code by using a whitelist instead of a blacklist?
True or false: It may be better to 'detect' good code by using a whitelist instead of a blacklist?
True or false: The text mentions 10 examples of malware?
True or false: The text mentions 10 examples of malware?