Podcast
Questions and Answers
Match the following types of malware with their characteristics:
Match the following types of malware with their characteristics:
Computer virus = Infects executable and document files Worm = Spreads from one computer to another without needing to attach to other files Trojan horse = Masquerades as a useful program to trick the user into installing it Spyware = Gathers information such as credit card numbers
Match the following viruses with their names:
Match the following viruses with their names:
ILOVEYOU = A computer virus Melissa = A computer virus Brain = A computer virus Code Red = A worm
Match the following worms with their names:
Match the following worms with their names:
Morris = A worm SoBig = A worm SQL Slammer = A worm MyDoom = A worm
Match the following actions with what worms can do:
Match the following actions with what worms can do:
Signup and view all the answers
Match the following activities with the type of malware that performs them:
Match the following activities with the type of malware that performs them:
Signup and view all the answers
DSL can provide speeds of up to 384kbps to 8 Mbps (megabits per second)
DSL can provide speeds of up to 384kbps to 8 Mbps (megabits per second)
Signup and view all the answers
Cable internet can provide speeds of up to 5mbps to 50mbps (megabits per second)
Cable internet can provide speeds of up to 5mbps to 50mbps (megabits per second)
Signup and view all the answers
The World Wide Web is a distributed interconnection of information on the Internet
The World Wide Web is a distributed interconnection of information on the Internet
Signup and view all the answers
Microsoft Internet Explorer (IE) is the most famous Web browser
Microsoft Internet Explorer (IE) is the most famous Web browser
Signup and view all the answers
A URL and a URI are the same thing.
A URL and a URI are the same thing.
Signup and view all the answers
FTP stands for File Transmission Protocol.
FTP stands for File Transmission Protocol.
Signup and view all the answers
Malware refers to any program or code that is intentionally designed to benefit a computer system.
Malware refers to any program or code that is intentionally designed to benefit a computer system.
Signup and view all the answers
Computer viruses are self-replicating programs that only spread via physical contact between devices.
Computer viruses are self-replicating programs that only spread via physical contact between devices.
Signup and view all the answers
The Internet is a worldwide network of telephones that allows users to access other telephones no matter how far away they are from each other.
The Internet is a worldwide network of telephones that allows users to access other telephones no matter how far away they are from each other.
Signup and view all the answers
ISDN offered two channels that could be combined to provide a maximum speed of 256 kbps for data transfer.
ISDN offered two channels that could be combined to provide a maximum speed of 256 kbps for data transfer.
Signup and view all the answers
DSL uses telephone lines for digital network connection.
DSL uses telephone lines for digital network connection.
Signup and view all the answers
Users connect to the Internet by signing up with Internet Service Providers (ISPs) who provide access to it.
Users connect to the Internet by signing up with Internet Service Providers (ISPs) who provide access to it.
Signup and view all the answers
Trojan horses need to attach to other computer files in order to spread.
Trojan horses need to attach to other computer files in order to spread.
Signup and view all the answers
Worms have the ability to spread themselves from one computer to another without attaching to other files.
Worms have the ability to spread themselves from one computer to another without attaching to other files.
Signup and view all the answers
The ILOVEYOU virus infects only Word documents and Excel spreadsheets.
The ILOVEYOU virus infects only Word documents and Excel spreadsheets.
Signup and view all the answers
Trojan horses can erase, corrupt, or overwrite files, spread other programs like viruses, log keystrokes, and spy on the user.
Trojan horses can erase, corrupt, or overwrite files, spread other programs like viruses, log keystrokes, and spy on the user.
Signup and view all the answers