Practice Test


Q1) ________ is the term used to describe the instruction a virus or worm executes in addition to copying itself when infected on the computer. Show Answer


Q2) ___________ is collection of software tools that helps enable someone to gain unauthorized access to a computer or other network device and often hide the tracks of the user accessing the computer or other network device. Show Answer


Q3) _________ is a computer virus that stores itself within memory allowing it to infect files instantaneously and does not require the uses to run the file to infect files. Show Answer


Q4) ________ is a term used to describe a back way, hidden method, or other form of bypassing traditional security in order to gain access to a secure area. Show Answer


Q5) __________ is a virus that hides its tracks after infecting the computer. Once the computer has been infected, the virus can make modifications to allow the computer to appear that it has not lost any memory or that the file size has not changed. Show Answer


Q6) ________ is a software program that is intentionally installed on the computer by a user to monitor or spy on what other users of the same computer are doing. Show Answer


Q7) _______ is a software program that stays dormant on a computer until it is remotely activated by another user, either through an IRC chat, or other remote communications. Show Answer


Q8) A _________ is a computer virus that has the capability of changing its own code, allowing the virus to have hundreds, sometimes thousands of different variants, making it much more difficult to notice or detect. Show Answer


Q9) _________ is a term used to describe a malicious individual or group of individuals scamming users by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Show Answer


Q10) __________ is a computer program that spreads by sounding itself to every address in the address book of infected person. Show Answer


Q11) ____________ is malicious code that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. Show Answer


Q12) In 2011, a Trojan referred as ___________ which attacks Windows 9x, 2000, XP, Vista, and Windows 7 operating systems. Actually, it disables security-related process of anti-virus programs, while also blocking access to the Internet which prevents updates. Show Answer


Q13) In the antivirus world, a ________ is an algorithm or hash that uniquely identifies a specific virus. Show Answer


Q14) A _________ is a collection of infected computers under the control of one or more attackers. Show Answer


Q15) _________ is a malicious code written in Macro language that may be run automatically when the document is opened; this provides a distinct mechanism by which viruses can be spread. Show Answer


Q16) _________ attack is a form of attacking another computer or company by sending millions or more requests every second causing the network to slow down and even cause errors or shut down of whole system. Show Answer


Q17) A / An __________ is a program or set of instructions designed to take advantage of a vulnerability in a program. Show Answer


Q18) A _________ virus is a malicious code that infects and spreads in multiple ways. Show Answer


Q19) An ________ is a malicious code that overwrites a file with its own code, helping spread the virus to other files and computers. Show Answer


Q20) A __________ is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system. Show Answer


Q21) A _________ attaches itself to executable programs, such as world processor, spreadsheet applications, and computer games. When the virus has infected a program, it propagates to infect other programs on the system, as well as other systems that use a shared infected program. Show Answer


Q22) __________ consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Show Answer


Q23) A _________ is a message warning the recipient of a non-existent computer virus threat. Show Answer


Q24) A __________ overwrites a part of its host file without increasing the length of the file while also preserving the host's functionality. Show Answer


Q25) A _________ virus may see a system contains the file PROGRAM.EXE and create a file called PROGRAM.COM. When the computer executes the file PROGRAM from the command line, the virus (PROGRAM.COM) runs before the actual PROGRAM.EXE. Often the virus will execute the original program afterwards so the system appears normal. Show Answer


Q26) An error in computer data is called Show Answer


Q27) When any process is destroyed, the process control block is Show Answer


Q28) 'Computer Virus' is a / an Show Answer


Q29) All of the following are examples of real security and privacy risks except Show Answer


Q30) Why should you delete unknown E-mail attachments ? Show Answer


Q31) Collecting personal information and effectively posing as another individual is known as the crime of Show Answer


Q32) A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Show Answer


Q33) _______ are attempts by individuals to obtain confidential information from you by falsifying their identity. Show Answer


Q34) Why is it unethical to share copyrighted files with your friends? Show Answer