Deck 3: Malware and Automated Computer Attacks

Full screen (f)
exit full mode
Question
What is a form of malware that runs autonomously on compromised systems that receive commands via remote requests through IRC?

A) virus
B) botnet malware
C) trojan horse
D) worm
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following was the first form of malware identified in the wild?

A) trojan
B) worm
C) virus
D) botnet malware
Question
What form of malware enables a network of infected computers to be commanded remotely after infection?

A) botnet
B) virus
C) exploit kit
D) none of the above
Question
What is the term most US states use to refer to malware distribution?

A) annoyances
B) malicious tools
C) illicit code
D) computer contaminants
Question
Which of the following is not a norm affecting individuals in the market for malware?

A) customer service
B) trust
C) price
D) individual skill
Question
What is the name of the agency formed as a result of the Morris Worm's spread?

A) Computer Emergency Response Team
B) US Secret Service
C) Symantec
D) Department of Homeland Security
Question
What type of malware can autonomously spread on its own but does not necessarily have a payload?

A) virus
B) trojan
C) worm
D) botnet malware
Question
What was the programming language used by virus writers to infect popular word processing software and other programs in the 1990s?

A) macro-programming languages
B) python
C) perl
D) C sharp
Question
Which of the following is not a negative consequence associated with malware infections?

A) loss of data
B) identity theft
C) time spent removing the infection
D) none of the above
Question
What was the name for a piece of malware created by mobman that became popular among hackers?

A) Sub7
B) CDC
C) Code Red
D) Melissa Virus
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Malware and Automated Computer Attacks
1
What is a form of malware that runs autonomously on compromised systems that receive commands via remote requests through IRC?

A) virus
B) botnet malware
C) trojan horse
D) worm
B
2
Which of the following was the first form of malware identified in the wild?

A) trojan
B) worm
C) virus
D) botnet malware
C
3
What form of malware enables a network of infected computers to be commanded remotely after infection?

A) botnet
B) virus
C) exploit kit
D) none of the above
A
4
What is the term most US states use to refer to malware distribution?

A) annoyances
B) malicious tools
C) illicit code
D) computer contaminants
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not a norm affecting individuals in the market for malware?

A) customer service
B) trust
C) price
D) individual skill
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
What is the name of the agency formed as a result of the Morris Worm's spread?

A) Computer Emergency Response Team
B) US Secret Service
C) Symantec
D) Department of Homeland Security
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
What type of malware can autonomously spread on its own but does not necessarily have a payload?

A) virus
B) trojan
C) worm
D) botnet malware
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
What was the programming language used by virus writers to infect popular word processing software and other programs in the 1990s?

A) macro-programming languages
B) python
C) perl
D) C sharp
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not a negative consequence associated with malware infections?

A) loss of data
B) identity theft
C) time spent removing the infection
D) none of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
What was the name for a piece of malware created by mobman that became popular among hackers?

A) Sub7
B) CDC
C) Code Red
D) Melissa Virus
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.