The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book
Indicate whether the statement is true or false.
False—This describes the Sobig virus. The Sasser virus/overflow attack spreads by exploiting a buffer overrun.
You might also like to view...
Answer the following statements true (T) or false (F)
1. An input validation loop is sometimes called an error handler. 2. If a user is asked to enter the number of widgets he or she wants to buy and enters "two", the program will automatically change the entry to an integer. 3. If a user is asked to enter the number of widgets he or she wants to buy, the isInteger function can be used to validate this input. 4. Programs should be designed to inspect all input before processing that input.
Create a new version of the lineDetect function that takes in a threshold and create a movie using lineDetect where the threshold changes depending on the frame number.
What will be an ideal response?
A __________ is available for use by any routine in the program, while a _______________ can be accessed only from the routine in which it is defined.
A. public attribute, class attribute B. private attribute, class attribute C. public attribute, private attribute D. class attribute, public attribute
Which of the following is not malware?
A. Trojan horses B. viruses C. Ad-Aware D. worms