Page 1

Full file at http://testbank360.eu/solution-manual-security-awareness-3rd-edition-mark-ciampa

Chapter 2 Review Questions 1. A _____ is a program that secretly attaches itself to a carrier such as a document or program and then executes when that document is opened or program is launched. a. virus b. worm c. rootkit d. Trojan 2. A virus can spread to another computer by each of the following except _____. a. an infected file as an e-mail attachment b. an infected file on a USB flash drive c. downloading an infected file from the Internet d. rebooting the computer 3. Which of the following is not a type of computer virus? a. file infector virus b. remote virus c. resident virus d. boot virus 4. A computer program that pretends to install a calendar program but actually erases files is known as a _____ . a. worm b. rootkit c. logic bomb d. Trojan 5. A difference between a worm and a virus is that:


Full file at http://testbank360.eu/solution-manual-security-awareness-3rd-edition-mark-ciampa

a. Worms run faster than viruses. b. Viruses expand the Master Boot Record. c. A virus must be attached to a carrier. d. A worm cannot harm a computer like a virus can. 6. The primary goal of a rootkit is to: a. hide its presence b. reformat the hard drive c. replicate to other computers d. start a botnet 7. A _____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event. a. logic bomb b. trigger c. worm d. virus 8. When thousands of zombie computers are manipulated under remote control this creates a _____. a. botnet b. zombie-net c. Trojan network d. herd 9. Each of the following is a technique to restrict the use of a USB device except: a. Disable the USB in hardware. b. Use third-party software to disable the USB. c. Flash the ROM BIOS. d. Disable the USB through the operating system.


Full file at http://testbank360.eu/solution-manual-security-awareness-3rd-edition-mark-ciampa

10. A(n) _____ is a general software security update intended to cover vulnerabilities that have been discovered after the program was released. a. key b. resource c. update release program (URP) d. patch 11. Attackers use _____ to remotely control zombies. a. Google b. e-mail c. spam d. Internet Relay Chat (IRC) 12. On modern computer systems the BIOS is stored on a _____ chip a. Silver flash b. Basic Output/Input c. Programmable Read Only Memory (PROM) d. Read Only Memory (ROM) 13. Each of the following is an advantage of a USB device except: a. large size b. contains rewritable storage c. lightweight d. removable 14. Each of the following is an option of antivirus (AV) software once it discovers a virus except: a. Clean the virus from the file b. Quarantine the infected file c. Send an e-mail to attacker that the virus has been exposed


Full file at http://testbank360.eu/solution-manual-security-awareness-3rd-edition-mark-ciampa

d. Delete the file that contains the virus 15. Each of the following is an attack that can be used against cell phones except: a. Lure users to malicious Web sites b. Infect the cell phone with malware c. Attack other cell phone users d. Turn off the cell phone 16. Attackers use a _____ to insert a new “return address” and point to another area in the data memory area that contains the attacker’s malware code. a. buffer overflow b. RAM segmentation c. storage register d. migration attack 17. Each of the following should be considered when creating a data backup strategy except: a. What information should be backed up? b. How often should it be backed up? c. What media should be used? d. Is it necessary to perform a backup? 18. RAID Level 1 uses disk mirroring which involves: a. reading data from the hard drive twice b. writing data to multiple hard drives c. flashing the BIOS d. decreased reliability 19. Each of the following is a storage media for backups except: a. USB flash drives b. portable USB hard drives


Full file at http://testbank360.eu/solution-manual-security-awareness-3rd-edition-mark-ciampa

c. Network attached storage (NAS) d. Internet services 20. An attacker who controls multiple zombies in a botnet is known as a _____. a. bot herder b. zombie shepherd c. rogue IRC d. cyber-robot

Solution manual security awareness 3rd edition mark ciampa  

solution manual security awareness 3rd edition mark ciampa. Full file at http://testbank360.eu/solution-manual-security-awareness-3rd-e...

Read more
Read more
Similar to
Popular now
Just for you