Tutorial test: Malicious code -- What's what

Test your knowledge of malicious code with this test.

Test your knowledge of malicious code with this series of multiple-choice questions. To learn more about malicious code, listen to the accompanying SearchSecurity.com tutorial webcast, Malicious code: What's what with Robert Vibert.

To take the test, jot down your answers on a piece of scrap paper, then check your answers here. No peeking!

1. What is a virus?
a) A program that e-mails from your computer.
b) A program that replicates.
c) A program that hides on your computer.

2. What is a Trojan horse?
a) A program that replicates.
b) A program that automatically spreads.
c) A program with hidden functions.

3. Data diddling is when...
a) data is overwritten.
b) data is altered.
c) data is e-mailed.

4. A multipartite virus...
a) Infects only hard disks.
b) Infects only files.
c) Infects multiple vectors.

5. Most viruses...
a) make themselves visible.
b) hide themselves.
c) reveal themselves after one infection.

6. More viruses are spread by...
a) e-mail.
b) Web pages.
c) floppy diskettes.

7. When you detect a virus, first...
a) shut down your computer immediately.
b) make some tea.
c) format your hard disk.

8. A blended threat would not...
a.) copy confidential information.
b.) erase your credit cards.
c.) open a backdoor.

9. The biggest potential damage caused by a virus is...
a) formatting the hard drive.
b) erasing files.
c) e-mailing confidential information.

10. Viruses exploit...
a) none of the known vulnerabilities.
b) some of the known vulnerabilities.
c) all of the known vulnerabilities.

Check your answers.

This was last published in May 2003

Dig Deeper on Secure software development

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close