Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1-Trojan horses can spread by ________. e-mailing themselves to victim computers

ID: 3602274 • Letter: 1

Question

1-Trojan horses can spread by ________.

e-mailing themselves to victim computers

directly propagating to victim computers

both A and B

neither A nor B

2-A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.

security error

vulnerability

security fault

malware

3-A program that can capture passwords as you enter them is ________.

a keystroke logger

data mining software

both A and B

neither A nor B

4-The Target attackers sold their stolen card information to ________.

crimeware shops

card counterfeiters

card shops

Hallmark

5-The general name for evil software is ________.

virus

exploit

worm

malware

6-Which of the following attach themselves to other programs?

Viruses

Worms

both A and B

neither A nor B

7-Vulnerability-based attacks that occur before a patch is available are called ________ attacks.

stealth

zero-day

preinstallation

malware

8-Which of the following can spread more rapidly?

directly-propagating worms

directly-propagating viruses

Both of the above can spread with approximately equal speed.

9-Which of the following probably suffered the most financial damage from the Target breach?

Target

consumers

POS vendors

banks

10-Malware programs that masquerade as system files are called ________.

scripts

payloads

Trojan horses

viruses

e-mailing themselves to victim computers

directly propagating to victim computers

both A and B

neither A nor B

Explanation / Answer

Answer:-

1) neither A nor B

2) vulnerability

3) a keystroke logger

4) card shops

5) malware

6) Viruses

7) zero-day

8) directly-propagating worms

9) Target

10) Trojan horses