click below
click below
Normal Size Small Size show me how
Tech Support Chap 12
Tech Support Chapter 12
Question | Answer |
---|---|
Antivirus Software | Protects a computer against infection by identifying and removing any malicious logic programs in memory, in storage, or on files coming in as e-mail attachments |
Back Up | Making a copy of a software/files/etc. |
Boot Sector Virus | Replaces the boot program used to start the computer system with a modified, infected version of the boot program |
Child, Parent, Grandparent Backup Method | Child: Daily Parent: Weekly Grandparent: Monthly |
Computer Virus | A program designed to infect a computer and replicate itself by attaching itself to other programs |
Diagnostic Software | Identify hardware problems |
Differential Backups | Backs up files that have changed or been created since the last full backup |
Disk Cloning | The creation of a complete image or copy of a computer’s hard drive, usually used to deploy a new operating system with application software on multiple computers in a corporate network or educational computer lab |
Disk Imaging | Single file or storage device containing the complete contents and structure representing a data storage medium or device, such as a hard drive, tape drives, floppy disk, CD/DVD/BD and key drive |
Encrypting Virus | Can transform itself into a nonreplicating program to avoid destruction by antivirus program |
File Virus | Inserts virus code into program files or executable files |
Full Backup | Backs up all data from the hard drive or a directory or folder of the hard drive |
Incremental backup | Backs up only files that have changed or been created since the last backup |
Initialization files | The root directory of the hard drive should contain only folders and system startup files |
Inoculate | A process used by an antivirus program to copy a program file, which records information such as file size and file creation date in a separate file. |
Logic bomb | Bomb is a program that is activated when a certain condition is detected |
Macro | A shorthand representation for a number of lines of code. |
Macro Virus | Uses the macro language of an application to hide virus code |
Malicious Logic Program | That replicates by creating copies of itself, either on one computer or any number of computers on a network |
Malicious Software Program | Any software that gives partial to full control of your computer to do whatever the malware creator wants. Malware can be a virus, worm, trojan, adware, spyware, root kit |
Master Boot Record (MBR) Viruses | Attack disks in the same manner as boot sector viruses |
Memory-Resident Virus | A virus that stays in memory after it executes and after its host program is terminated. In contrast, non-memory-resident viruses only are activated when an infected application runs. |
Multipartite Virus | Has characteristics of a boot sector virus and a file virus |
Non-Memory-Resident Virus | A virus that independently searches for and infects new targets on a computer system, rather than installing itself into memory and infecting executable files launched by the user. |
Payload | The destructive event or prank the virus was created to deliver |
Polymorphic Virus | Changes its distinguishing characteristics as it replicates |
Polypartite Virus | Infect both boot records and program files |
Quarantine | Makes the virus not be able to work |
Stealth Virus | Actively conceals itself |
Time Bomb | A type of logic bomb that is activated on a particular date |
Trojan horse | A destructive program disguised as a real application, such as a screen saver |
Utility Software | A program that performs a specific task, usually related to managing system resources or identifying a problem with a PC |
Virus Definition | Unique string of bits, or the binary pattern, of the machine code of a virus |
Virus Hoax | An e-mail message that spreads a false virus warning, usually in chain letter fashion, from person to person |
Virus Signature | Known pattern of virus code |
Virus | A program designed to infect a computer and replicate itself by attaching itself to other programs |
Worm | A malicious logic program that replicates by creating copies of itself, either on one computer or any number of computers on a network |