Chapter Review Answers
Answers A, B, C, D, and E, are all correct. Common forms of security risks include adware, spyware, dialers, hack tools, and joke programs. In addition to these, browser cookies and applications pretending to be antispyware tools can pose risks to users.
Answers A, B, C, D, E, and F are all correct. Security risks can impact computer performance and security by consuming all available computer capacity or causing computer instability that requires frequent reboot or application restart actions. They can also waste user time through both distraction and removal requirements, or can display undesirable content such as graphic images. Security risks can threaten user privacy and security by harvesting sensitive data, profiling a user’s computer for exploitable vulnerabilities, or directly impairing normal security procedures.
Answers A, C, and D are correct. Best practices recommended to reduce risks include regular software updates, secure browser settings, careful browsing, and the use of antivirus, antispyware, and client firewall applications such as those provided in Symantec Client Security. Running unknown applications received via email is never recommended, as this is a common way to be infected by security risks and threats.
Answer C is correct. A virus is a malicious program that requires user interaction or some other form of enacting process to infect a computer and spread.
Answer C is correct. A boot-sector virus can execute before an operating system is loaded, making later removal more troublesome than many other types of infection. Early detection before infection is highly desirable in all cases, but nowhere more so than with boot-sector infections.
Answer C is correct. Blended threats combine the characteristics of viruses, worms, Trojan horses with server and Internet vulnerabilities to initiate, transmit, and spread an attack. By using multiple methods and techniques, blended threats can rapidly spread and cause widespread damage.
Answer A is correct. A worm is a program that is capable of spreading without relying on user interaction. Because of this behavior, worms can spread to all network-connected vulnerable computers in a very short period of time.
Answer D is correct. Worms can impact an enterprise much more than most viruses because worms can self-propagate to all vulnerable computers. This allows a much wider distribution of newly released worms, which can also saturate a network’s connectivity by attempting to spread to all available target addresses.
Answer D is correct. A Trojan horse is best described as an application that provides some type of desirable functionality while hiding other functions from the user.