100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ITN 261 Final || 100% Verified Solutions.

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
04-07-2025
Written in
2024/2025

Malware in the current day has been adopted by criminals for a wide array of purposes to capture information about the victim or commit other acts. correct answers True In some cases, spyware creators have stated their intentions outright by presenting End-User License Agreements (EULAs) to the victim. correct answers True Malware can be used to turn a system into a server hosting any type of content, such as illegal music or movies, pirated software, pornography, and financial data. correct answers True The first viruses debuted in the "wild" in the 1990s as ways to destroy exam records at universities. correct answers False Hoax viruses are those designed to make the user take action even though no infection or threat exists. correct answers True Logic bombs are relatively easy to detect. correct answers False Modern antivirus software is not equipped to deal with the problems polymorphic viruses pose. correct answers False If any part of a multipartite virus is not eradicated from the infected system, it can re-infect the system. correct answers True Antivirus software cannot detect suspicious behavior of applications on a system. correct answers False Worms require user intervention for their infection to take place; viruses do not. correct answers False

Show more Read less
Institution
ITN 261
Course
ITN 261

Content preview

ITN 261 Final || 100% Verified Solutions.


Malware in the current day has been adopted by criminals for a wide array of purposes to capture
information about the victim or commit other acts. correct answers True


In some cases, spyware creators have stated their intentions outright by presenting End-User
License Agreements (EULAs) to the victim. correct answers True


Malware can be used to turn a system into a server hosting any type of content, such as illegal
music or movies, pirated software, pornography, and financial data. correct answers True


The first viruses debuted in the "wild" in the 1990s as ways to destroy exam records at
universities. correct answers False


Hoax viruses are those designed to make the user take action even though no infection or threat
exists. correct answers True


Logic bombs are relatively easy to detect. correct answers False


Modern antivirus software is not equipped to deal with the problems polymorphic viruses pose.
correct answers False


If any part of a multipartite virus is not eradicated from the infected system, it can re-infect the
system. correct answers True


Antivirus software cannot detect suspicious behavior of applications on a system. correct
answers False


Worms require user intervention for their infection to take place; viruses do not. correct answers
False

,One of the main characteristics of worms is that they do not need a host program to function.
correct answers True


Education is the first line of defense for stopping both worms and viruses. correct answers True


Of the tools for detecting Trojans, one of the easiest to access would be the command line tool
known as netstat. correct answers True


Wrappers can be used to merge an attacker's intended payload with a harmless executable to
create a single executable from the two. correct answers True


Many attackers gain access to their target system through something known as a window. correct
answers False


Covert channels are not capable of transferring information using a mechanism that was not
designed for the purpose. correct answers False


Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) or PS2 port
on a system and monitor the passing signals for keystrokes. correct answers True


Delivering malicious software via instant messaging (IM) is relatively difficult because IM
software has had strong security controls from the beginning. correct answers False


Scareware is software specifically designed to display advertisements on a system in the form of
pop-ups or nag screens. correct answers False


Adware is a type of malware designed to trick victims into purchasing and downloading useless
and potentially dangerous software. correct answers False

, Which of the following terms refers to any software that is inherently hostile, intrusive, or
annoying in its operation? correct answers Malware


Which of the following laws was originally passed to address federal computer-related offenses
and the cracking of computer systems? correct answers The Computer Fraud and Abuse Act of
1986


Which of the following is NOT a type of malware? correct answers Gameware


Which of the following types of malware is a piece of code or software that spreads from system
to system by attaching itself to other files and is activated when the file is accessed? correct
answers Virus


The part of a hard drive or removable media that is used to boot programs is called the: correct
answers boot sector.


Which of the following types of viruses is designed to change its code and "shape" to avoid
detection by virus scanners, which would look for a specific virus code and not the new version?
correct answers Polymorphic virus


Which of the following types of viruses is a piece of code or software designed to lie in wait on a
system until a specified event occurs? correct answers Logic bomb


Which of the following types of viruses infects using multiple attack vectors, including the boot
sector and executable files on the hard drive? correct answers Multipartite virus


Which of the following types of viruses infects and operates through the use of a programming
language built into applications such as Microsoft Office in the form of Visual Basic for
Applications (VBA)? correct answers Macro virus

Written for

Institution
ITN 261
Course
ITN 261

Document information

Uploaded on
July 4, 2025
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
View profile
Follow You need to be logged in order to follow users or courses
Sold
758
Member since
3 year
Number of followers
439
Documents
37896
Last sold
5 days ago
Reign Supreme Scholarly || Enlightened.

Get your revised study materials available here and elevate your educational outcomes. I have numerous verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. I am dedicated to offering you the best and unique learning content. You are encouraged to inquire further assistance from this end whenever need be. Kindly remember to leave your review, understanding your satisfaction is essential . We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
3.7

114 reviews

5
49
4
20
3
22
2
8
1
15

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions