Preview

07 - Malware, Viruses and Worms

 1. Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems are commonly referred to as:
mv1.png

  Spyware

  Malware

  Adware

  Bots

 2. Fill in the blanks.
World’s first computer virus named__________, coded by the Alvi brothers from Pakistan,
was originally designed to infect the IBM PC; it replaced the boot sector of its floppy
disk with the virus to protect their medical software from piracy.

  John

  Daniel

  Brain

  Peter

 3. What are Worms?

  Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malicious code.

  A standalone malicious computer program that replicates itself over a computer network.

  Junk emails also known as Spam.

  A type of Trojan designed to transfer other malware onto a PC via Internet connection.

 4. What is the name of the automated processes that are designed to interact over the internet without the need of human interaction?

  Machines

  Bots

  Ghosts

  Drones

 5. Spyware programs track your browsing habits and other personal details and send it to a remote user.
mv2.png

  TRUE

  FALSE

 6. A computer program containing malicious segment that attaches itself to an application program or other executable component is called:

  Flash Cookie

  Spam

  Advare

  Virus

 7. Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is known as:
mv3.jpg

  Adware

  Backdoor

  Trojan

  Spyware

 8. Which type of files pose the greatest risk related to the distribution of malware?

  .txt

  .exe

  .pdf

  .png

 9. In computer security, an automatic download performed without the user's consent (and often without any notice) aimed at installing malware or potentially unwanted programs is known as a drive-by download.

  FALSE

  TRUE

 10. A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:

  Armored Virus

  Retrovirus

  Phage Virus

  Macro Virus

 11. Fill in the blanks.
The process of isolation of files and applications suspected of containing malware in order to prevent further execution and potential harm to the user's system is known as_______________.

  Safe Mode

  Protected Mode

  Quarantine

  Blacklisting

 12. A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:

  Proxy

  Downloader

  Dropper

  Dialer

 13. What is the function of Windows Defender software?
mv4.png

  Reviewing the computer's status and resolving issues

  Protection against viruses, spyware and other potentially unwanted software

  Management of User Account Control (UAC)

  Allowing and blocking applications through Windows Firewall

 14. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?

  Bot

  Worm

  Virus

  Trojan Horse

 15. How can you protect your computer from malware?

  Never open unknown links, use online website safety checker tools if you’re not sure to open a website.

  Use genuine software.

  All of the above.

  Install an antivirus software and update it regularly.

 16. Which of these application types fall(s) into the category of anti-malware solutions?

  Antivirus

  Pop-up Blocker

  All of them.

  Anti-spyware

 17. Which of the following components pose(s) a risk of unintended downloading and execution of malware on a PC?
mv5.jpg

  All of them.

  Keylogger

  Browser plugins

  Tracking cookies

 18. Fill in the blanks.
Websites use_____________to verify users as human and prevent malicious bot attacks. 

  CAPTCHA

  Logic Bomb

  Signature files

  UTM

 19. The process by which malicious software changes its underlying code in order to avoid detection is known as polymorphism.

  TRUE

  FALSE

 20. An antivirus software can be kept up to date through:

  OS updates

  Cleaning the Quarantine

  Virus signature updates and engine updates

  Audit trails