Answer the following statement(s) true (T) or false (F)
1. An industrial spy hacks computers or Web sites in an attempt to promote a political ideology.
2. Macros can insert unwanted words, numbers, or phrases into documents or alter command functions.
3. Worms propagate without human intervention and send copies of themselves to other computers via email.
4. A Trojan horse abuses email systems to send unsolicited email to large numbers of people.
5. A distributed denial-of-service attack involves infiltration of target systems.
1.FALSE
Industrial spies capture trade secrets and attempt to gain an unfair competitive advantage. They are usually hired by organizations or individuals to illegally gain data and access to other organizations’ trade secrets.
2.TRUE
Macros can insert unwanted words, numbers, or phrases into documents or alter command functions. After a macro virus infects a user’s application, it can embed itself in all future documents created with the application.
3.TRUE
Unlike a computer virus, which requires users to spread infected files to other users, a worm is a harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email.
4.False
A Trojan horse is a program in which malicious code is hidden inside a seemingly harmless program. The program’s harmful payload might be designed to enable the hacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or Social Security numbers, or spy on users by recording keystrokes and transmitting them to a server operated by a third party.
5.FALSE
A distributed denial-of-service attack does not involve infiltration of the targeted system. Instead, it keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in—the Internet equivalent of dialing a telephone number repeatedly so that all other callers hear a busy signal.
You might also like to view...
Which of the following statements is false?
a. A graphical user interface (GUI) presents a user-friendly mechanism for interacting with an app. A GUI (pronounced “GOO-ee”) gives an app a distinctive “look-and-feel.” b. GUIs are built from GUI components—sometimes called controls or widgets. c. Providing different apps with consistent, intuitive user-interface components gives users a sense of familiarity with a new app, so that they can learn it more quickly and use it more productively. d. All of the above statements are true.
Which of the following is NOT a field in an Ethernet frame?
A. Destination address B. Length C. port D. FCS
The user provides the criterion at run time when using a lookup list
Indicate whether the statement is true or false
Which of the OSI model layers has the main purpose of defining and negotiating data formatting?
A) Presentation B) Application C) Transport D) Network E) Data link