The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book

Indicate whether the statement is true or false.


False—This describes the Sobig virus. The Sasser virus/overflow attack spreads by exploiting a buffer overrun.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. An input validation loop is sometimes called an error handler. 2. If a user is asked to enter the number of widgets he or she wants to buy and enters "two", the program will automatically change the entry to an integer. 3. If a user is asked to enter the number of widgets he or she wants to buy, the isInteger function can be used to validate this input. 4. Programs should be designed to inspect all input before processing that input.

Computer Science & Information Technology

Create a new version of the lineDetect function that takes in a threshold and create a movie using lineDetect where the threshold changes depending on the frame number.

What will be an ideal response?

Computer Science & Information Technology

A __________ is available for use by any routine in the program, while a _______________ can be accessed only from the routine in which it is defined.

A. public attribute, class attribute B. private attribute, class attribute C. public attribute, private attribute D. class attribute, public attribute

Computer Science & Information Technology

Which of the following is not malware?

A. Trojan horses B. viruses C. Ad-Aware D. worms

Computer Science & Information Technology