Preview

13 - Worms Trojans Viruses on the Internet

 1. Malware or malicious software is a computer program that is installed on a computer to disinfect it.

  FALSE

  TRUE

 2. The aim of malware is to:

  All of the above

  damage the computer

  compromise system security

  perform uninvited actions on the computer

 3. Viruses can be spread by ……………………….and can cause great damage including deletion of data or corruption of data.

  None of the above

  software stored in isolation

  hard disk loops

  email attachments

 4. It is possible for a virus to delete the entire contents of a victim's hard disk

  FALSE

  TRUE

 5. Worms are unlike viruses in that they have to attach themselves to a program and are usually involved in altering or deleting files.

  TRUE

  FALSE

 6. Worms are usually ………………….. and ………………. Programs that can use up system resources.

  common / virus-like

  None of the above

  attached / non self replicating

  standalone / self replicating

 7. This type of malware is typically involved in halting or slowing down tasks by using system bandwidth and by increasing traffic.

  worms

  None of the above

  viruses

  trojans

 8. A …………….. can be inadvertently (accidentally) installed as it is hidden within another file, so the user is unaware of it.

  None of the above

  worms

  viruses

  trojans

 9. Security protection methods include:

  Encryption

  intrusion detection systems (IDS)

  Firewalls, Anti Virus Software and Digital Signatures

  All of the above

 10. Trojans can be used to spy on user activities, such as monitoring user keystrokes or user activities.

  TRUE

  FALSE