Preview

13 - Worms Trojans Viruses on the Internet

 1. Malware or malicious software is a computer program that is installed on a computer to disinfect it.

  FALSE

  TRUE

 2. The aim of malware is to:

  All of the above

  perform uninvited actions on the computer

  compromise system security

  damage the computer

 3. Viruses can be spread by ……………………….and can cause great damage including deletion of data or corruption of data.

  hard disk loops

  email attachments

  software stored in isolation

  None of the above

 4. It is possible for a virus to delete the entire contents of a victim's hard disk

  FALSE

  TRUE

 5. Worms are unlike viruses in that they have to attach themselves to a program and are usually involved in altering or deleting files.

  TRUE

  FALSE

 6. Worms are usually ………………….. and ………………. Programs that can use up system resources.

  None of the above

  common / virus-like

  standalone / self replicating

  attached / non self replicating

 7. This type of malware is typically involved in halting or slowing down tasks by using system bandwidth and by increasing traffic.

  viruses

  trojans

  None of the above

  worms

 8. A …………….. can be inadvertently (accidentally) installed as it is hidden within another file, so the user is unaware of it.

  viruses

  None of the above

  trojans

  worms

 9. Security protection methods include:

  Firewalls, Anti Virus Software and Digital Signatures

  intrusion detection systems (IDS)

  Encryption

  All of the above

 10. Trojans can be used to spy on user activities, such as monitoring user keystrokes or user activities.

  TRUE

  FALSE