Question | Answer |
A malicious software program that is created expressly for the purpose of causing damage to a computer system is called a(n) | Computer Virus |
In the ___ stage, the virus arrives by way of floppy disk, CD, e-mail, or a network connection. | Infection |
In the ___ stage, the virus duplicates itself to other programs, files, drives, or other computers on a network | Replication |
Some forms of ___(s) are harmless and just annoying; others can be very destructive | Execution |
All viruses have a(n) ___, which describes the virus. | Signature |
Virus designed to go unprotected and leave a back door into your system. | Back door virus |
A destructive program that is slipped into an application and waits dormant until some event takes place, allowing the virus to spread to other computers before releasing its payload | Logic Bomb |
A common virus created using a macro programming language. It is attached to documents that use the language. | Macro Virus |
An extremely destructive virus that attacks the master boot record of a hard disk, resulting in hard disk failure | MBR Virus |
A class of virus that appears as a gift, such as a free download of a game or utility program or an e-mail attachment. | Trojan horse |
A destructive program that contaminates files on the infected computer and spreads itself to other computers without prompting from the user. | worm |
A collection of infected computers that are controlled by a source computer | botnet |
A false message spread about a real or unreal virus. | hoax |
A virus that steals passwords | password virus |
A virus that changes as it evolves so that it may go undetected by antivirus programs. | polymorphic virus |
A collection of software programs that an intruder installs on a computer that allows the intruder to take total control at a level equal to the system administrator. | rootkit |
Virus that hides from normal detection by incorporating itself into part of a known, and usually required, program for the computer. | stealth virus |
Designed to support advertisements, such as popups and may also gather information about the user. | Adware |
Used to gather information about a user's Web browsing habits for marketing purposes. | data miner |
A collection of malware that is not regarded as very dangerous, but rather more of a nuisance. | Grayware |
Malware that keeps track of all keys pressed by the user. | Keylogger |
A method of using e-mail to impersonate a legitimate company or institution, thus fooling the user into believing the e-mail is from a trusted source. | phishing |
Unsolicited junk e-mail or junk electronic newsletters. | Spam |
Program that changes the Internet Explorer browser configuration, such as replacing the default home page. | browser hijacker |
A small text file used to send information about a user to a server. | cookie |
A program that automatically disables a telephone modem that is dialing a number and automatically switches to another phone number. | dialer |
The deceptive practice based on poisoning a DNS server with an incorrect IP address for a Web site. | pharming |
Designed to track a user's habits, such as their Web browsing habits. | spyware |
The first step in virus removal is to _____ the virus. | identify |
The characteristics of a virus are found in the virus's ____ file. | signature |
Most viruses and worms have hidden, system, or read only file attributes set to help ___ it. | protect |
The second step in virus removal is to ___ the virus. | Remove |
If there is no ___ prepared, you can usually find step-by-step instructions on the Web. | removal tool |
To ensure the complete removal of a virus, you should ____ all CDs, floppy disks, and Flash drives. | scan |