Preview

13 - Worms Trojans Viruses on the Internet

 1. Malware or malicious software is a computer program that is installed on a computer to disinfect it.

  TRUE

  FALSE

 2. The aim of malware is to:

  perform uninvited actions on the computer

  compromise system security

  damage the computer

  All of the above

 3. Viruses can be spread by ……………………….and can cause great damage including deletion of data or corruption of data.

  hard disk loops

  software stored in isolation

  None of the above

  email attachments

 4. It is possible for a virus to delete the entire contents of a victim's hard disk

  TRUE

  FALSE

 5. Worms are unlike viruses in that they have to attach themselves to a program and are usually involved in altering or deleting files.

  FALSE

  TRUE

 6. Worms are usually ………………….. and ………………. Programs that can use up system resources.

  common / virus-like

  standalone / self replicating

  None of the above

  attached / non self replicating

 7. This type of malware is typically involved in halting or slowing down tasks by using system bandwidth and by increasing traffic.

  None of the above

  viruses

  worms

  trojans

 8. A …………….. can be inadvertently (accidentally) installed as it is hidden within another file, so the user is unaware of it.

  trojans

  worms

  viruses

  None of the above

 9. Security protection methods include:

  All of the above

  Encryption

  Firewalls, Anti Virus Software and Digital Signatures

  intrusion detection systems (IDS)

 10. Trojans can be used to spy on user activities, such as monitoring user keystrokes or user activities.

  TRUE

  FALSE