• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
Are Trojan Horses viruses
no, but they act like them
What is a Polymorphic Viruses
a viruses that change sits own code to avoid detection.
what is a multipartite virus
A virus designed to infect multiple file types.
Stealth viruses is
a viruses that temporarily erases their code from files and hides in active memory
Viruses can be classified by the methods
they take to avoid detection.
Antivirus software works by
looking for virus signatures, quarantining and inoculating key files
What are encryption viruses
Compress files using encryption key then ask for money to get a decrypter
Scripts are
mini programs that are executed without your knowledge
A script viruses attacks your computer when you run a .... script
malicious
Melissa virus became first major..... virus, it was also an example of the first ....virsus
macro, email
The melissa virus sent it self to the first .....people in the adress boook
50
....... are viruses that are triggered when certain logical conditions are met
Logic Bombs
......are viruses that are triggered by the passage of time or on a certain date.
time bomb
Worms are slightly different from viruses in that they attempt to travel between systems through network connections to spread their infection.
true
The ........... is a virus that executed whenever a computer boots up, ensuring that the virus will be loaded into the memory immediately
boot sector virsus
True or false. If your computer is exposed to a file infected with a virsus, the virus will to to copy itself and infect a file on your computer.
True
true/false. If you never expose your computer to new files it will never become infected.
True
true of false. just opening an e-mail message will infect your computer with a virus.
false
Why is a wireless network more vulnerable than a wired network?
they have wide ranges including areas outside your house
What are logical ports?
Logical Ports are virtual communication gateways or paths that allow a computer to organize requests for information such as web page downloads.
What is a denial of Service attack or DOS attack?
In a denial of service attack legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie. Computers can handle only certain number of requests before they shut down
How do hackers steal a credit card number?
They use a packet sniffer.
true or false. Wired Ethernet networks are the fastest home networks.
true
What if a node on the network can't communicate with other nodes or with the router?
repositioning the node or the wireless network adapter within the same room can often affect communication between the nodes.
the maxium range of wireless devices is about 250 feet?
true
A transceiver is a device that translates the electronic data that needs to be sent along the netwrok into radio waves then broadcasts theses radio wave to other network nodes.
true
true of false. Just like other networks each node on a wireless network requires a wireless network adapter.
true
.....are devices that transfer packets of data between two or more newtorks.
ROUTERS
A SWITCH ACTS LIKE A .... FOR PACKETS OF INFORAMTION
TRAFFIC SIGNAL
A HUB IS A NETWORK NAVIGATION DEVICE THAT MERELY RETRANSMITS A SIGNAL TO ALL OTHER NODES ATTACHED TO IT.
TRUE