Question

incident response course Question 26 One of the main characteristics of worms is that they do...

incident response course

Question 26

One of the main characteristics of worms is that they do not need a host program to function.

True

False

               

Question 27

Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) port on a system and monitor the passing signals for keystrokes.

True

False

Question 28

Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system?

A.            Virus

B.            Rootkit

C.            Worm

D.            Trojan

Question 29

Adware is a type of virus.

True

False

Question 30

Education is key to stopping both worms and viruses.

True

False

Homework Answers

Answer #1

PLEASE GIVE IT A THUMBS UP, I SERIOUSLY NEED ONE, IF YOU NEED ANY MODIFICATION THEN LET ME KNOW, I WILL DO IT FOR YOU
AS I DONE MOST OF YOUR ANSWERS, THOUGH WE ARE ONLY ALLOWED TO ATTEMPT ONE ANSWER OR FOUR SUB PARTS, PLEASE GIVE IT A THUMBS UP

Question 26

One of the main characteristics of worms is that they do not need a host program to function.

True   

Question 27

Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) port on a system and monitor the passing signals for keystrokes.

True

Question 28

Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system?

Worm

Question 29

Adware is a type of virus.

False

Question 30

Education is key to stopping both worms and viruses.

True

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
incident response course Question 36 Which of the following is a general term for software that...
incident response course Question 36 Which of the following is a general term for software that is inherently hostile, intrusive, or annoying in its operation? A.            Adware B.            Malware C.            Scareware D.            Worm Question 37 Worms require user intervention for their infection to take place; viruses do not. True False Question 38 An attacker can use a keystroke logger to monitor activity on a system and have it reported back to the attacker. True False Question 39 Dean believes that...
incident response course Question 31 The drawback of planting a backdoor on a system is that...
incident response course Question 31 The drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future. True False                 Question 32 Hoax viruses are those designed to make the user take action even though no infection or threat exists. True False Question 33 Which of the following is malware that looks legitimate but hides a payload that does something unwanted? A.            Trojan B.           ...
incident response course Question 6 Which of the following types of viruses infects and operates through...
incident response course Question 6 Which of the following types of viruses infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office? A.            Multipartite virus B.            Polymorphic virus C.            Logic bomb D.            Macro virus Question 7 Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs? A.            Macro virus B.           ...