This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 1. (Points: 4) What kind of malware program copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network? a. Trojan Horse b. Worm c. Antivirus d. Virus Save Answer 2. (Points: 4) All of the following actions can help a virus deliver its payload EXCEPT: a. Opening an infected file b. Running an infected program c. Connecting an unprotected computer to a network d. Examining a Virus signature Save Answer 3. (Points: 4) What is the name for a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer or network? a. Malware b. Botnets c. Spoofing d. Back door Save Answer 4. (Points: 4) What is the name for a vulnerable computer connected to a network to gather evidence on the people who...
View Full Document
This note was uploaded on 01/31/2011 for the course COM S 103 taught by Professor Chang during the Fall '08 term at Iowa State.
- Fall '08