Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
Are Trojan Horses viruses
|
no, but they act like them
|
|
What is a Polymorphic Viruses
|
a viruses that change sits own code to avoid detection.
|
|
what is a multipartite virus
|
A virus designed to infect multiple file types.
|
|
Stealth viruses is
|
a viruses that temporarily erases their code from files and hides in active memory
|
|
Viruses can be classified by the methods
|
they take to avoid detection.
|
|
Antivirus software works by
|
looking for virus signatures, quarantining and inoculating key files
|
|
What are encryption viruses
|
Compress files using encryption key then ask for money to get a decrypter
|
|
Scripts are
|
mini programs that are executed without your knowledge
|
|
A script viruses attacks your computer when you run a .... script
|
malicious
|
|
Melissa virus became first major..... virus, it was also an example of the first ....virsus
|
macro, email
|
|
The melissa virus sent it self to the first .....people in the adress boook
|
50
|
|
....... are viruses that are triggered when certain logical conditions are met
|
Logic Bombs
|
|
......are viruses that are triggered by the passage of time or on a certain date.
|
time bomb
|
|
Worms are slightly different from viruses in that they attempt to travel between systems through network connections to spread their infection.
|
true
|
|
The ........... is a virus that executed whenever a computer boots up, ensuring that the virus will be loaded into the memory immediately
|
boot sector virsus
|
|
True or false. If your computer is exposed to a file infected with a virsus, the virus will to to copy itself and infect a file on your computer.
|
True
|
|
true/false. If you never expose your computer to new files it will never become infected.
|
True
|
|
true of false. just opening an e-mail message will infect your computer with a virus.
|
false
|
|
Why is a wireless network more vulnerable than a wired network?
|
they have wide ranges including areas outside your house
|
|
What are logical ports?
|
Logical Ports are virtual communication gateways or paths that allow a computer to organize requests for information such as web page downloads.
|
|
What is a denial of Service attack or DOS attack?
|
In a denial of service attack legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie. Computers can handle only certain number of requests before they shut down
|
|
How do hackers steal a credit card number?
|
They use a packet sniffer.
|
|
true or false. Wired Ethernet networks are the fastest home networks.
|
true
|
|
What if a node on the network can't communicate with other nodes or with the router?
|
repositioning the node or the wireless network adapter within the same room can often affect communication between the nodes.
|
|
the maxium range of wireless devices is about 250 feet?
|
true
|
|
A transceiver is a device that translates the electronic data that needs to be sent along the netwrok into radio waves then broadcasts theses radio wave to other network nodes.
|
true
|
|
true of false. Just like other networks each node on a wireless network requires a wireless network adapter.
|
true
|
|
.....are devices that transfer packets of data between two or more newtorks.
|
ROUTERS
|
|
A SWITCH ACTS LIKE A .... FOR PACKETS OF INFORAMTION
|
TRAFFIC SIGNAL
|
|
A HUB IS A NETWORK NAVIGATION DEVICE THAT MERELY RETRANSMITS A SIGNAL TO ALL OTHER NODES ATTACHED TO IT.
|
TRUE
|