Answer the following statement(s) true (T) or false (F)
1. An industrial spy hacks computers or Web sites in an attempt to promote a political ideology.
2. Macros can insert unwanted words, numbers, or phrases into documents or alter command functions.
3. Worms propagate without human intervention and send copies of themselves to other computers via email.
4. A Trojan horse abuses email systems to send unsolicited email to large numbers of people.
5. A distributed denial-of-service attack involves infiltration of target systems.
1.FALSE
Industrial spies capture trade secrets and attempt to gain an unfair competitive advantage. They are usually hired by organizations or individuals to illegally gain data and access to other organizations’ trade secrets.
2.TRUE
Macros can insert unwanted words, numbers, or phrases into documents or alter command functions. After a macro virus infects a user’s application, it can embed itself in all future documents created with the application.
3.TRUE
Unlike a computer virus, which requires users to spread infected files to other users, a worm is a harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email.
4.False
A Trojan horse is a program in which malicious code is hidden inside a seemingly harmless program. The program’s harmful payload might be designed to enable the hacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or Social Security numbers, or spy on users by recording keystrokes and transmitting them to a server operated by a third party.
5.FALSE
A distributed denial-of-service attack does not involve infiltration of the targeted system. Instead, it keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in—the Internet equivalent of dialing a telephone number repeatedly so that all other callers hear a busy signal.
You might also like to view...
What is a preformatted database designed for a specific purpose?
A) Pattern B) Template C) Starter D) Sample
The nextDoubleInRange(A, B) function returns a number r such that ____.
A. A = r > B C. A < r < B D. A >= r >= B