Podcast
Questions and Answers
Match the following types of malware with their characteristics:
Match the following types of malware with their characteristics:
Computer virus = Infects executable and document files Worm = Spreads from one computer to another without needing to attach to other files Trojan horse = Masquerades as a useful program to trick the user into installing it Spyware = Gathers information such as credit card numbers
Match the following viruses with their names:
Match the following viruses with their names:
ILOVEYOU = A computer virus Melissa = A computer virus Brain = A computer virus Code Red = A worm
Match the following worms with their names:
Match the following worms with their names:
Morris = A worm SoBig = A worm SQL Slammer = A worm MyDoom = A worm
Match the following actions with what worms can do:
Match the following actions with what worms can do:
Match the following activities with the type of malware that performs them:
Match the following activities with the type of malware that performs them:
DSL can provide speeds of up to 384kbps to 8 Mbps (megabits per second)
DSL can provide speeds of up to 384kbps to 8 Mbps (megabits per second)
Cable internet can provide speeds of up to 5mbps to 50mbps (megabits per second)
Cable internet can provide speeds of up to 5mbps to 50mbps (megabits per second)
The World Wide Web is a distributed interconnection of information on the Internet
The World Wide Web is a distributed interconnection of information on the Internet
Microsoft Internet Explorer (IE) is the most famous Web browser
Microsoft Internet Explorer (IE) is the most famous Web browser
A URL and a URI are the same thing.
A URL and a URI are the same thing.
FTP stands for File Transmission Protocol.
FTP stands for File Transmission Protocol.
Malware refers to any program or code that is intentionally designed to benefit a computer system.
Malware refers to any program or code that is intentionally designed to benefit a computer system.
Computer viruses are self-replicating programs that only spread via physical contact between devices.
Computer viruses are self-replicating programs that only spread via physical contact between devices.
The Internet is a worldwide network of telephones that allows users to access other telephones no matter how far away they are from each other.
The Internet is a worldwide network of telephones that allows users to access other telephones no matter how far away they are from each other.
ISDN offered two channels that could be combined to provide a maximum speed of 256 kbps for data transfer.
ISDN offered two channels that could be combined to provide a maximum speed of 256 kbps for data transfer.
DSL uses telephone lines for digital network connection.
DSL uses telephone lines for digital network connection.
Users connect to the Internet by signing up with Internet Service Providers (ISPs) who provide access to it.
Users connect to the Internet by signing up with Internet Service Providers (ISPs) who provide access to it.
Trojan horses need to attach to other computer files in order to spread.
Trojan horses need to attach to other computer files in order to spread.
Worms have the ability to spread themselves from one computer to another without attaching to other files.
Worms have the ability to spread themselves from one computer to another without attaching to other files.
The ILOVEYOU virus infects only Word documents and Excel spreadsheets.
The ILOVEYOU virus infects only Word documents and Excel spreadsheets.
Trojan horses can erase, corrupt, or overwrite files, spread other programs like viruses, log keystrokes, and spy on the user.
Trojan horses can erase, corrupt, or overwrite files, spread other programs like viruses, log keystrokes, and spy on the user.
Flashcards are hidden until you start studying