Deck 3: Malware and Automated Computer Attacks

ملء الشاشة (f)
exit full mode
سؤال
What is a form of malware that runs autonomously on compromised systems that receive commands via remote requests through IRC?

A) virus
B) botnet malware
C) trojan horse
D) worm
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following was the first form of malware identified in the wild?

A) trojan
B) worm
C) virus
D) botnet malware
سؤال
What form of malware enables a network of infected computers to be commanded remotely after infection?

A) botnet
B) virus
C) exploit kit
D) none of the above
سؤال
What is the term most US states use to refer to malware distribution?

A) annoyances
B) malicious tools
C) illicit code
D) computer contaminants
سؤال
Which of the following is not a norm affecting individuals in the market for malware?

A) customer service
B) trust
C) price
D) individual skill
سؤال
What is the name of the agency formed as a result of the Morris Worm's spread?

A) Computer Emergency Response Team
B) US Secret Service
C) Symantec
D) Department of Homeland Security
سؤال
What type of malware can autonomously spread on its own but does not necessarily have a payload?

A) virus
B) trojan
C) worm
D) botnet malware
سؤال
What was the programming language used by virus writers to infect popular word processing software and other programs in the 1990s?

A) macro-programming languages
B) python
C) perl
D) C sharp
سؤال
Which of the following is not a negative consequence associated with malware infections?

A) loss of data
B) identity theft
C) time spent removing the infection
D) none of the above
سؤال
What was the name for a piece of malware created by mobman that became popular among hackers?

A) Sub7
B) CDC
C) Code Red
D) Melissa Virus
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Malware and Automated Computer Attacks
1
What is a form of malware that runs autonomously on compromised systems that receive commands via remote requests through IRC?

A) virus
B) botnet malware
C) trojan horse
D) worm
B
2
Which of the following was the first form of malware identified in the wild?

A) trojan
B) worm
C) virus
D) botnet malware
C
3
What form of malware enables a network of infected computers to be commanded remotely after infection?

A) botnet
B) virus
C) exploit kit
D) none of the above
A
4
What is the term most US states use to refer to malware distribution?

A) annoyances
B) malicious tools
C) illicit code
D) computer contaminants
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not a norm affecting individuals in the market for malware?

A) customer service
B) trust
C) price
D) individual skill
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the name of the agency formed as a result of the Morris Worm's spread?

A) Computer Emergency Response Team
B) US Secret Service
C) Symantec
D) Department of Homeland Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
What type of malware can autonomously spread on its own but does not necessarily have a payload?

A) virus
B) trojan
C) worm
D) botnet malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
What was the programming language used by virus writers to infect popular word processing software and other programs in the 1990s?

A) macro-programming languages
B) python
C) perl
D) C sharp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not a negative consequence associated with malware infections?

A) loss of data
B) identity theft
C) time spent removing the infection
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
What was the name for a piece of malware created by mobman that became popular among hackers?

A) Sub7
B) CDC
C) Code Red
D) Melissa Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.