Fill This Form To Receive Instant Help
Homework answers / question archive / Saint Leo University COM 520 Chapter 5 1)Which type of malware is a standalone program that replicates and sends itself to other computers? A
Saint Leo University
COM 520
Chapter 5
1)Which type of malware is a standalone program that replicates and sends itself to other computers?
A. Worm
B. Virus
C. Rootkit
D. Trojan
2. Which type of malware modifies or replaces parts of the operating system to hide the fact that the computer has been compromised?
A. Worm
B. Virus
C. Rootkit
D. Trojan
D. Trojan
3. Which term describes a unique set of instructions that identify malware code?
A. Fingerprint
B. Signature
C. Rule set
D. Heuristic
4. A signature database that is one month old may potentially expose that computer to how many new threats?
A. 70,000
B. 490,000
c. 210,000
D. 2,100,000
5. Which of the following terms describes
a secure location to store identified malware?
A. Safe
B. Vault
C. Signature database
D. Secure storage
6. Which of the following anti-malware compo nents is also referred to as a real-time scanner?
A. Shield
B. Scanner
C. Heuristic engine
D. Antivirus software
7. Which anti-malware tool is included with Windows 7?
A. Windows AntiVirus
B. Windows Doctor
C. Windows Defender
D. Windows Sweeper
8. Which of the following best describes a zero-day attack?
A. Malware that no longer is a threat
B. Malware that can exploit a vulnerability but has not yet been released
C. Malware that is actively exploiting vulnerabilities on computers that have not applied the latest patches
D. Malware that is actively exploiting an unknown vulnerability
9. What is the best first step to take when malware is discovered soon after installing new software?
A. Uninstall the new software.
B. Scan for malware.
C. Update the new software.
D. Install additional anti-malware software.
10. What is the best first step to take if initial actions to remove malware are not successful?
A. Install additional anti-malware software.
B. Rescan for malware.
C. Update the signature database.
D. Disconnect the computer from the network.
11. Which type of malware covertly primarily collects pieces of information?
A. Spyware
B. Trojan
C. Virus
D. Rootkit
12. Why is a rootkit so difficult to detect?
A. Most anti-malware tools don't scan for rootkits.
B. A rootkit gives administrator privileges to an attacker.
C. A rootkit does not run in memory.
D. A rootkit may have modified the tools used to detect it.
Already member? Sign In