incident response course
Question 6
Which of the following types of viruses infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office?
A. Multipartite virus
B. Polymorphic virus
C. Logic bomb
D. Macro virus
Question 7
Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs?
A. Macro virus
B. Multipartite virus
C. Polymorphic virus
D. Logic bomb
Question 8
Which of the following laws was originally passed to address federal computer-related offenses and the cracking of computer systems?
A. The Hacker Act of 1984
B. The Computer Fraud and Abuse Act of 1986
C. The Malware Act of 1990
D. The Patriot Act
Question 9
Logic bombs are relatively easy to detect.
True
False
Question 10
Joon believes that a worm infected several systems on his network. Which of the following statements is NOT true about worms?
A. They consume bandwidth and resources.
B. They do not require a host program.
C. They require user action to spread.
D. They replicate rapidly.
6. D. Macro Virus
Macro Virus infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office.
7. D. Logic Bomb
Logic Bomb is a piece of code or software designed to lie in wait on a system until a specified event occurs.
8. B. The Computer Fraud and Abuse Act of 1986
The Computer Fraud and Abuse Act of 1986 passed to address federal computer-related offenses and the cracking of computer systems.
9. False
Logic bombs are not easy to detect.
10. C. They require user action to spread
Worms do not require any user action or a host file to spread.
Get Answers For Free
Most questions answered within 1 hours.