Question

incident response course Question 6 Which of the following types of viruses infects and operates through...

incident response course

Question 6

Which of the following types of viruses infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office?

A.            Multipartite virus

B.            Polymorphic virus

C.            Logic bomb

D.            Macro virus

Question 7

Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs?

A.            Macro virus

B.            Multipartite virus

C.            Polymorphic virus

D.            Logic bomb

Question 8

Which of the following laws was originally passed to address federal computer-related offenses and the cracking of computer systems?

A.            The Hacker Act of 1984

B.            The Computer Fraud and Abuse Act of 1986

C.            The Malware Act of 1990

D.            The Patriot Act

Question 9

Logic bombs are relatively easy to detect.

True

False

Question 10

Joon believes that a worm infected several systems on his network. Which of the following statements is NOT true about worms?

A.            They consume bandwidth and resources.

B.            They do not require a host program.

C.            They require user action to spread.

D.            They replicate rapidly.

Homework Answers

Answer #1

6. D. Macro Virus

Macro Virus infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office.

7. D. Logic Bomb

Logic Bomb is a piece of code or software designed to lie in wait on a system until a specified event occurs.

8. B. The Computer Fraud and Abuse Act of 1986

The Computer Fraud and Abuse Act of 1986 passed to address federal computer-related offenses and the cracking of computer systems.

9. False

Logic bombs are not easy to detect.

10. C. They require user action to spread

Worms do not require any user action or a host file to spread.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
incident response course Question 36 Which of the following is a general term for software that...
incident response course Question 36 Which of the following is a general term for software that is inherently hostile, intrusive, or annoying in its operation? A.            Adware B.            Malware C.            Scareware D.            Worm Question 37 Worms require user intervention for their infection to take place; viruses do not. True False Question 38 An attacker can use a keystroke logger to monitor activity on a system and have it reported back to the attacker. True False Question 39 Dean believes that...
incident response course Question 31 The drawback of planting a backdoor on a system is that...
incident response course Question 31 The drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future. True False                 Question 32 Hoax viruses are those designed to make the user take action even though no infection or threat exists. True False Question 33 Which of the following is malware that looks legitimate but hides a payload that does something unwanted? A.            Trojan B.           ...
incident response course Question 26 One of the main characteristics of worms is that they do...
incident response course Question 26 One of the main characteristics of worms is that they do not need a host program to function. True False                 Question 27 Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) port on a system and monitor the passing signals for keystrokes. True False Question 28 Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system? A.            Virus B.           ...
QUESTION 1 Viruses are important in ecological processes in directly stimulating which process? A. Uptake of...
QUESTION 1 Viruses are important in ecological processes in directly stimulating which process? A. Uptake of nitrogen to make amino acids and other organic N compounds B. Nitrification C. Nitrogen fixation D. Nitrogen mineralization 2 points    QUESTION 2 One difference between SARS-CoV-2 and influenza viruses is that SARS-CoV-2 A. is a retrovirus B. infects through respiratory droplets C. has a single molecule encoding its genome D. embeds spike proteins in the host cell membrane before new virion budding E....
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT