You are on page 1of 2

MEDINA COLLEGE

DEPARTMENT OF COMPUTER SCIENCE


CS410-INFORMATION ASSURANCE & SECURITY
PRE-FINAL EXAMINATION
SEM: 1 - SY: 2023-2024

STUDENT NAME: _________________________________________________ EXAM DATE: _______________

NOTE: - ERASURE OF ANY KIND WILL MERIT A WRONG MARK.


- ANY FORM OF CHEATING WILL NOT BE TOLERATED, PAPERS OF VIOLATORS WILL NOT BE ACCEPTED.

I– Select the right answer from the table down below and write them in the space provided in each question. (1 PT Each)

Boot Sector Worm Virus Scanner Buffer Overflow


Transient Rogue Program
Appended Viruses Program Security Flaw Rabbit Virus
Agent Viruses That Surround a Program
Virus Document Virus Integrated Viruses & Replacements
Time Bomb Resident
Logic Bomb Virus Signature Penetrate & Patch

1. The _________________ is the writer of the program or the person who causes its distribution. By this definition, most faults
found in software inspections, reviews, and testing do not qualify as malicious code, because we think of them as unintentional.
2. A _________________ is a program that can pass on malicious code to other non-malicious programs by modifying them. The
term was coined because the affected program acts like its biological counterpart: It infects other healthy subjects by attaching
itself to the program and either destroying it or coexisting with it.
3. A ________________ virus has a life that depends on the life of its host; the virus runs when its attached program executes and
terminates when its attached program ends.
4. A _______________ virus locates itself in memory; then it can remain active or be activated as a stand-alone program, even after
its attached program ends.
5. A ______________ is malicious code that, in addition to its primary effect, has a second, nonobvious malicious effect.
6. A ________________ is a class of malicious code that "detonates" or goes off when a specified condition occurs.
7. A ________________ is a logic bomb whose trigger is a time or date.
8. A ________________ is a program that spreads copies of itself through a network.
9. A ________________ as a virus or worm that self-replicates without bound, with the intention of exhausting some computing
resource. A rabbit might create copies of itself and store them on disk, in an effort to completely fill the disk.
10. Early work in computer security was based on the paradigm of "____________________”. in which analysts searched for and
repaired faults. Often, a top-quality "tiger team" would be convened to test a system's security by attempting to cause it to fail. The
test was considered to be a "proof" of security; if the system withstood the attacks, it was considered secure.
11. ____________________________ is inappropriate program behaviour caused by a program vulnerability. It can derive from any
kind of software fault. That is, they cover everything from a misunderstanding of program requirements to a one-character error in
coding or even typing.
12. A __________________ is the computing equivalent of trying to pour two liters of water into a oneliter pitcher: Some water is
going to spill out and make a mess. And in computing, what a mess these errors have made!
13. Malicious code or a _________________ is the general name for unanticipated or undesired effects in programs or program
parts, caused by an agent intent on damage. This definition eliminates unintentional errors, although they can also have a serious
negative effect.
14. A _____________________attaches itself to a program; then, whenever the program is run, the virus is activated. This kind of
attachment is usually easy to program.
15. ___________________________________ An alternative to the attachment is a virus that runs the original program but has
control before and after its execution.
16. _________________________________________ A third situation occurs when the virus replaces some of its target, integrating
itself into the original code of the target.. Clearly, the virus writer has to know the exact structure of the original program to know
where to insert which pieces of the virus..
17. Currently, the most popular virus type is what we call the ____________________, which is implemented within a formatted
document, such as a written document, a database, a slide presentation, or a spreadsheet. These documents are highly
structured files that contain both data (words or numbers) and commands (such as formulas, formatting controls, links).
18. A special case of virus attachment, but formerly a fairly popular one, is the so-called ______________ virus. When a computer is
started, control begins with firmware that determines which hardware components are present, tests them, and transfers control to
an operating system.
19. A virus cannot be completely invisible. Code must be stored somewhere, and the code must be in memory to execute. Moreover,
the virus executes in a particular way, using certain methods to spread. Each of these characteristics yields a telltale pattern,
called a ________________________.
20. The virus's signature is important for creating a program, called a ___________________, that can automatically detect and, in
some cases, remove viruses. it searches memory and long-term storage, monitoring execution and watching for the telltale
signatures of viruses.

II – True or False (1PT Each)


1. ______________ Viruses can infect only Microsoft Windows systems.
2. ______________ Viruses can modify "hidden" or "read only" files.
3. ______________ Viruses spread only on disks or only in e-mail.
4. ______________ Viruses can be malevolent, benign, or benevolent.
5. ______________ Viruses cannot remain in memory after a complete power off/power on reboot.

III . ESSAY (5 PTS Each)

1. Storage Patterns of Computer Viruses


______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
2. Execution Patterns of Computer Viruses
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________

3. Prevention of Virus Infection


______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________

PREPARED BY:

“ Honesty is the fastest way to


DUANE CHINO A. ATIS * prevent a mistake from turning
INSTRUCTOR into a failure. ” by James Altucher

You might also like