2-7 Flashcards
microsoft office has been created so that a legitimate programer can access internal objects to create applications and intergrate into ___________
microsoft office suite
after a virus is on a system it ca do
anything a legitimate program can do
an older virus with a multi modal threat( IE, it needed more then one mechanism to spread). it copied and shared itself with any other drive on the network. classified as a worm rather then a virus. described as virulent.
sobig
the sobig virus could be detected by the telltale signs in the sujector title of the__________
a variant of the sobig virus would have the computer download a file from the internet that would then cause ____________
printing problems
website that lists current viruses and what to look for in an email
F-Secure
virus source code is both_________ and _________
readable and alterable
infects the macros in office documents
macro virus
microsoft outlook is designed so that a programmer can write scripts using a subset or the _______________
Visual basic programing language or visual basic for applications
does not infect the OS of the target computer but instead it attacks the __________
boot sector drive
by operating outside the OS a _________________ is harder to detect
boot secoter drive
one of the largest groups of viruses
stealth viruses
by ataching itself to a legitimate program not only will this trick the user into installing the program, it will evade antivirus software
stealth virus
it changes its form in order to avoid detection by antivirus software
polymorphic virus
attempt to elude detection by performing its malicious activity only
sparse infector virus