click below
click below
Normal Size Small Size show me how
Viruses
| Question | Answer |
|---|---|
| A malicious software program that is created expressly for the purpose of causing damage to a computer system is called a(n) | Computer Virus |
| In the ___ stage, the virus arrives by way of floppy disk, CD, e-mail, or a network connection. | Infection |
| In the ___ stage, the virus duplicates itself to other programs, files, drives, or other computers on a network | Replication |
| Some forms of ___(s) are harmless and just annoying; others can be very destructive | Execution |
| All viruses have a(n) ___, which describes the virus. | Signature |
| Virus designed to go unprotected and leave a back door into your system. | Back door virus |
| A destructive program that is slipped into an application and waits dormant until some event takes place, allowing the virus to spread to other computers before releasing its payload | Logic Bomb |
| A common virus created using a macro programming language. It is attached to documents that use the language. | Macro Virus |
| An extremely destructive virus that attacks the master boot record of a hard disk, resulting in hard disk failure | MBR Virus |
| A class of virus that appears as a gift, such as a free download of a game or utility program or an e-mail attachment. | Trojan horse |
| A destructive program that contaminates files on the infected computer and spreads itself to other computers without prompting from the user. | worm |
| A collection of infected computers that are controlled by a source computer | botnet |
| A false message spread about a real or unreal virus. | hoax |
| A virus that steals passwords | password virus |
| A virus that changes as it evolves so that it may go undetected by antivirus programs. | polymorphic virus |
| A collection of software programs that an intruder installs on a computer that allows the intruder to take total control at a level equal to the system administrator. | rootkit |
| Virus that hides from normal detection by incorporating itself into part of a known, and usually required, program for the computer. | stealth virus |
| Designed to support advertisements, such as popups and may also gather information about the user. | Adware |
| Used to gather information about a user's Web browsing habits for marketing purposes. | data miner |
| A collection of malware that is not regarded as very dangerous, but rather more of a nuisance. | Grayware |
| Malware that keeps track of all keys pressed by the user. | Keylogger |
| A method of using e-mail to impersonate a legitimate company or institution, thus fooling the user into believing the e-mail is from a trusted source. | phishing |
| Unsolicited junk e-mail or junk electronic newsletters. | Spam |
| Program that changes the Internet Explorer browser configuration, such as replacing the default home page. | browser hijacker |
| A small text file used to send information about a user to a server. | cookie |
| A program that automatically disables a telephone modem that is dialing a number and automatically switches to another phone number. | dialer |
| The deceptive practice based on poisoning a DNS server with an incorrect IP address for a Web site. | pharming |
| Designed to track a user's habits, such as their Web browsing habits. | spyware |
| The first step in virus removal is to _____ the virus. | identify |
| The characteristics of a virus are found in the virus's ____ file. | signature |
| Most viruses and worms have hidden, system, or read only file attributes set to help ___ it. | protect |
| The second step in virus removal is to ___ the virus. | Remove |
| If there is no ___ prepared, you can usually find step-by-step instructions on the Web. | removal tool |
| To ensure the complete removal of a virus, you should ____ all CDs, floppy disks, and Flash drives. | scan |