Contents

A process that uses the spawn mechanism to strike system performance is called……
a) internal thief   
b) worm
c) code stacker    
d) none of these

b

The internal code of any software that will set of a malicious function when specified conditions are met, is called…..
a) logic bomb                     
b) trap door
c) code stacker    
d) none of these


a

The pattern that can be used to identify a virus is known as……
a) stealth                                              
b) virus signature
c) armored                           
d) none of these


b

Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service             
b) port scanning
c) memory access violation                              
d) dumpster diving


b

Multipartite viruses attack on……….
a) files                                   
b) boot sector
c) memory                           
d) all of these


d

What does DMZ stand for?
a) design zone                     
b) drawing zone
c) demilitarizes zone
d) all of these

c