Preview

09 - Malware, Viruses and Worms

 1. Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems are commonly referred to as:
mv1.png

  Adware

  Malware

  Bots

  Spyware

 2. Fill in the blanks.
World’s first computer virus named__________, coded by  the Alvi brothers from Pakistan, was originally designed to infect the IBM PC; it replaced the boot sector of its floppy disk with the virus to protect their medical software from piracy.

  Peter

  John

  Brian

  Daniel

 3. What are Worms?

  Junk emails also known as Spam.

  A standalone malicious computer program that replicates itself over a computer network.

  A type of Trojan designed to transfer other malware onto a PC via Internet connection.

  Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malicious code.

 4. What is the name of the automated processes that are designed to interact over the internet without the need of human interaction?

  Bots

  Drones

  Ghosts

  Machines

 5. Spyware programs track your browsing habits and other personal details and send it to a remote user.
mv2.png

  TRUE

  FALSE

 6. A computer program containing malicious segment that attaches itself to an application program or other executable component is called:

  Spam

  Advare

  Virus

  Flash Cookie

 7. Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is known as:
mv3.jpg

  Trojan

  Spyware

  Backdoor

  Adware

 8. Which type of files pose the greatest risk related to the distribution of malware?

  .exe

  .pdf

  .png

  .txt

 9. In computer security, an automatic download performed without the user's consent (and often without any notice) aimed at installing malware or potentially unwanted programs is known as a drive-by download.

  TRUE

  FALSE

 10. A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:

  Phage Virus

  Armored Virus

  Macro Virus

  Retrovirus

 11. Fill in the blanks.
The process of isolation of files and applications suspected of containing malware in order to prevent further execution and potential harm to the user's system is known as_______________.

  Protected Mode

  Safe Mode

  Blacklisting

  Quarantine

 12. A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:

  Dropper

  Downloader

  Dialer

  Proxy

 13. What is the function of Windows Defender software?
mv4.png

  Management of User Account Control (UAC)

  Reviewing the computer's status and resolving issues

  Protection against viruses, spyware and other potentially unwanted software

  Allowing and blocking applications through Windows Firewall

 14. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?

  Worm

  Trojan Horse

  Bot

  Virus

 15. How can you protect your computer from malware?

  Install an antivirus software and update it regularly.

  Use genuine software.

  Never open unknown links, use online website safety checker tools if you’re not sure to open a website.

  All of the above.

 16. Which of these application types fall(s) into the category of anti-malware solutions?

  Pop-up Blocker

  Anti-spyware

  Antivirus

  All of them.

 17. Which of the following components pose(s) a risk of unintended downloading and execution of malware on a PC?
mv5.jpg

  All of them.

  Keylogger

  Browser plugins

  Tracking cookies

 18. Fill in the blanks.
Websites use_____________to verify users as human and prevent malicious bot attacks. 

  CAPTCHA

  Signature files

  Logic Bomb

  UTM

 19. The process by which malicious software changes its underlying code in order to avoid detection is known as polymorphism.

  TRUE

  FALSE

 20. An antivirus software can be kept up to date through:

  OS updates

  Virus signature updates and engine updates

  Cleaning the Quarantine

  Audit trails