Chapter Review Questions
Question 2-1
Which of the following are types of security risks? Select all that apply.
-
Adware
-
Dialers
-
Hack tools
-
Joke programs
- Spyware
Question 2-2
Spyware can impact computer performance and security in which of the following ways? Select all that apply.
-
Overwhelming computer capacity
-
Wasting time
-
Displaying graphic content
-
Harvesting sensitive data
-
Weakening computer security
-
Causing programs to fail
Question 2-3
What are some of the ways that computers can be protected from threats and security risks? Select all that apply.
-
Update software regularly
-
Run unknown applications received via email
-
Make use of a firewall application
-
Make use of an antispyware application
Question 2-4
Which of the following best describes a virus? Select the best answer from those provided.
-
A malicious program capable of spreading itself automatically
-
A malicious program that makes use of many different vectors of transmission
-
A malicious program that usually requires user interaction to spread
-
An application that provides some form of desirable functionality while also performing other undesirable tasks hidden from the user
Question 2-5
Which type of virus can execute before an operating system is loaded? Select the best answer from those provided.
-
Macro virus
-
File virus
-
Boot-sector virus
-
Blended threat
Question 2-6
A blended threat is what type of program? Select the best answer from those provided.
-
Both a virus and a worm
-
A program that can change itself during replication
-
A program that spreads using many different methods and techniques
-
A program capable of targeting only a single operating system
-
Both a virus and a Trojan horse
Question 2-7
Which of the following best describes a worm? Select the best answer from those provided.
-
A program capable of spreading itself automatically
-
A program that makes use of many different vectors of transmission
-
A program that usually requires user interaction to spread
-
A program that provides some form of desirable functionality while also performing other undesirable tasks hidden from the user
Question 2-8
Why do worms impact an organization much more than most viruses? Select the best answer from those provided.
-
Worms can spread by many different means.
-
Viruses automatically replicate themselves.
-
Worms can relay data without the user's knowledge.
-
Worms automatically replicate themselves.
Question 2-9
Which of the following best describes a Trojan horse? Select the best answer from those provided.
-
A malicious program capable of spreading itself automatically
-
A malicious program that makes use of many different vectors of transmission
-
A malicious program that usually requires user interaction to spread
-
An application that provides some form of desirable functionality while also performing other malicious tasks hidden from the user