Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CIST1601-Chapter 5 Review Questions with complete answers

Beoordeling
-
Verkocht
-
Pagina's
4
Cijfer
A+
Geüpload op
07-06-2022
Geschreven in
2020/2021

CIST1601-Chapter 5 Review Questions with complete answers 1. Which of the following is the best definition of virus? A) program that causes harm on your computer B) program used in a DoS attack C) program that slows down networks D) program that self-replicates D) program that self-replicates 2. What is the most common damage caused by virus attacks? A) slowing down networks by the virus traffic B) deleting files C) changing the Windows registry D) corrupting the operating system A) slowing down networks by the virus traffic 00:38 01:20 3. What is the most common way for a virus to spread? A) by copying to shared folders B) by e-email attachment C) by FTP D) corrupting the operating system B) by e-email attachment 4. Which of the following is the primary reason that Microsoft Outlook is so often a target for virus attacks? A) Many hackers dislike Microsoft B) Outlook copies virus files faster C) It is easy to write programs that access Outlook's inner mechanisms D) Outlook is more common than other e-mail systems C) It is easy to write programs that access Outlook's inner mechanisms 5. Which of the following virus attacks used a multi-modal approach? A) Slammer virus B) Mimail virus C) Sobig virus D) Bagle virus A) Slammer virus 6. What factor about the Sobig virus made it most intriguing to security experts? A) It spread in multiple ways B) It deleted critical system files C) It was difficult to protect against D) It was very sophisticated A) It spread in multiple ways 7. What was most interesting to security experts about the Mimail virus? A) It spread more rapidly than other virus attacks B) It spread in multiple ways C) It grabbed e-mail addresses from documents on the hard drive D) It deleted critical system files C) It grabbed e-mail addresses from documents on the hard drive 8. Which of the following reasons most likely made the Bagle virus spread so rapidly? A) The e-mail containing to be from the system administrator B) It copied itself across the network C) It was a sophisticated virus D) It was particularly virulent A) The e-mail containing to be from the system administrator 9. What made the Bagle virus so dangerous? A) It changed Windows registry settings B) It disabled antivirus software C) It deleted key system files D) It corrupted the operating system B) It disabled antivirus software 10. Which of the following is a way that any person can use to protect against virus attacks? A) set up a firewall B) use encrypted transmissions C) use secure e-mail software D) never open unknown e-mail attachments D) never open unknown e-mail attachments 11. Which of the following is the safest way to send and receive attachments? A) use a code word indicating the attachment is legitimate B) only send spreadsheet attachments C) use encryption D) use virus scanners before opening attachments A) use a code word indicating the attachment is legitimate 12. Which of the following is true regarding e-mailed security alerts? A) You must follow them B) Most companies do not send alerts via email C) You can trust attachments on security alerts D) Most companies send alerts via e-email B) Most companies do not send ale

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CIST1601-Chapter 5 Review Questions
1.
Which of the following is the best definition of virus?
A) program that causes harm on your computer
B) program used in a DoS attack
C) program that slows down networks
D) program that self-replicates - Answer D) program that self-replicates

2.
What is the most common damage caused by virus attacks?
A) slowing down networks by the virus traffic
B) deleting files
C) changing the Windows registry
D) corrupting the operating system - Answer A) slowing down networks by the virus
traffic

3.
What is the most common way for a virus to spread?
A) by copying to shared folders
B) by e-email attachment
C) by FTP
D) corrupting the operating system - Answer B) by e-email attachment

4.
Which of the following is the primary reason that Microsoft Outlook is so often a target
for virus attacks?
A) Many hackers dislike Microsoft
B) Outlook copies virus files faster
C) It is easy to write programs that access Outlook's inner mechanisms
D) Outlook is more common than other e-mail systems - Answer C) It is easy to write
programs that access Outlook's inner mechanisms

5.
Which of the following virus attacks used a multi-modal approach?
A) Slammer virus
B) Mimail virus
C) Sobig virus
D) Bagle virus - Answer A) Slammer virus

6.
What factor about the Sobig virus made it most intriguing to security experts?
A) It spread in multiple ways
B) It deleted critical system files
C) It was difficult to protect against
D) It was very sophisticated - Answer A) It spread in multiple ways

7.

Geschreven voor

Vak

Documentinformatie

Geüpload op
7 juni 2022
Aantal pagina's
4
Geschreven in
2020/2021
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$9.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5228
Lid sinds
4 jaar
Aantal volgers
3570
Documenten
56177
Laatst verkocht
3 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

952 beoordelingen

5
453
4
167
3
174
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen