Answer page: Malware quiz

1. Answer: c. 200,000 signatures
McAfee Inc. recently achieved a depressing milestone, namely the inclusion of the 200,000th malware signature in its VirusScan database.

To learn what learn more about this achievement, read our Threat Monitor tip, Malware: The changing landscape or

download the Threat Monitor podcast, and listen to this tip on your computer or MP3 player. 2. Answer: d. macro virus Macro viruses are among the most common viruses, and they tend to do the least damage. Macro viruses infect Microsoft Word and typically insert unwanted words or phrases in documents.

To learn more about viruses review the our glossary definition; to learn about evolving malware trends, read our Threat Monitor tip, Malware: The changing landscape or download the Threat Monitor podcast and listen to this tip on your computer or MP3 player.
























































3. Answer: b. variant strain of controlled spam
Instead of huge virus events, he said, "the preferred method of malware distribution now involves the creation of many minor variants sent through controlled spam efforts."

To learn more about McAfee's malware milestone, read Senior News Writer Bill Brenner's recent Security Blog Log column, or read our Threat Monitor tip, Malware: The changing landscape.
























































4. Answer: b. 31%
The McAfee report also provides some interesting data on the diversity of the malware universe. In its Avert Labs blog, the vendor revealed its database composition:

To learn more about the the diversity of the malware landscape, read our Threat Monitor tip, Malware: The changing landscape or download the Threat Monitor podcast and listen to this tip on your computer or MP3 player.
























































5. Answer: b. False
While this advice may seem obvious, ask yourself, are you 100% confident in your current antivirus infrastructure? If your internal audit group hasn't done so already, conduct a random audit of systems in your enterprise (both workstations and servers) and verify that they are properly configured and receive antivirus updates.

To learn how to mitigate malware threats, read our Threat Monitor tip, Malware: The changing landscape or download the Threat Monitor podcast and listen to this tip on your computer or MP3 player.

This was first published in October 2006

Dig deeper on Malware, Viruses, Trojans and Spyware

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close