Lesson 8 Flashcards
Which virus put infected computers into a network where they can be remotely controlled?
Botnets
Asymptomatic means a virus _____
Is difficult to detect because it replicates itself as a program that appears to be safe.
The Love Letter virus was characterized by _____.
a malicious email which seemed to come from someone in the victim’s mailing list with a ‘Love-Letter-for-You-txt.vbs’ attachment
answer txt.vbs
Trojan viruses are downloaders that:
spread other malicious programs and remotely control the computer it is downloaded on
The first computer virus developed was the _____.
Bob Thomas of BBN created the very first virus called the Creeper Program.
The beginning of computer viruses stemmed from _____.
the Replicating Automata concept
What is a computer virus?
It is malicious code that had been designed to replicate itself in its host causing system disruptions, instability, unauthorized modifications, or disability of core functions and processes.
The Brain Boot virus is so-called because it affects the _____ of the host device.
The Brain Boot virus would alter the boot sector of any floppy disk used to copy a particular software package.
Which option below best describes the primary intent of a Trojan horse?
The primary intent of a Trojan horse is to obtain personal information.
Which of these is considered a decreased measurable?
A decreased measurable, like a loss of battery life, could point to mobile malware.
The term ‘rooting’ applies to which of these?
Android systems are ‘rooted’ when the controls in the operating system are ignored.
answer: android
Which of these is a way to take a preventative measure against malware?
The others are only useful once malware has made its way to your phone.
answer: keeping your operating system up to date
Malware that is used to steal your information and send it to a third party is known as _____
Spyware
Areas of Weakness
What is malware? - def examples, types
the history of computer viruses