15.3.6 Check Your Understanding – Malware Answers

1. Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send.

  • virus
  • worm
  • Trojan horse

Explanation: Eliseo was infected by a worm, which uses the network to send copies of itself to other connected hosts.

2. Noah downloaded a file from the internet. Shortly after he opened the file, his hard drive crashed, and he lost all information on his computer.

  • virus
  • worm
  • Trojan horse

Explanation: Noah opened a file which activated a virus that corrupted data on his hard drive.

3. Safa was surfing the internet when a program appeared claiming that she had won a prize. When she clicked to see what prize she had won, a program was installed on her computer unknowingly to her. The program that was installed allowed an intruder access to her hard drive and personal information.

  • virus
  • worm
  • Trojan horse

Explanation: Safa downloaded a Trojan horse, which appears like a legitimate program when in fact it is an attack tool.

4. True or false? Spyware is a program that gathers personal information from your computer without your permission or knowledge.

  • true
  • false

Explanation: The correct answer is true. Information gathered by spyware is typically sent to advertisers or others on the internet and can include passwords and account numbers. Tracking cookies and adware are types of spyware.

5. True or false? A botnet is an individual infected computer that can be controlled by a command and control server.

  • true
  • false

Explanation: The correct answer is false. A botnet is a group of computers, not one computer. An individual infected computer controlled by a command and control server is called a zombie.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments