Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. The main difference between a computer virus and a computer worm is that a co

ID: 3567305 • Letter: 1

Question

1.       The main difference between a computer virus and a computer worm is that a computer virus:

a.

is embedded within another program.

b.

is self-replicating.

c.

is spread via the Internet.

d.

is a self-contained program.

e.

There is no difference between a computer virus and a computer worm.

Question 3

Which of the following malicious tasks are actions that can be performed by the hidden program mentioned in question 2?

Answer

a.

Opening an Internet connection that allows an outsider to gain access to files on the user

a.

is embedded within another program.

b.

is self-replicating.

c.

is spread via the Internet.

d.

is a self-contained program.

e.

There is no difference between a computer virus and a computer worm.

Explanation / Answer

1)

The main difference between a computer virus and a computer worm is that a computer virus is embedded within another program. Hence, option ‘a’ is the correct answer.

2)

An Anti-Virus is a program with a benign capability that, when executed, unleashes the actions of another hidden program with a sinister purpose.

3)

Malicious tasks are actions that can be performed by the hidden program. Following are some of the malicious tasks.

Hence, option ‘e’ is correct answer.

4)

The maximum penalty for violating the Computer Fraud and Abuse act is 10 years and a $100,000 fine. Hence, option ‘a’ is correct answer.

5)

Someone who manipulates the telephone system in order to communicate with others without paying for the call is referred to as a phone phreak. Hence, option ‘c’ is correct answer.

6)

On June 13, 1989, all calls to the Palm Beach County Probation Department in Delray Beach, Florida, were picked up by a phone-sex hotline in New York State. The person responsible went by the nickname “Fry Guy” and received that nickname because, he used a password stolen from a local McDonald’s manager to log into a McDonald’s mainframe and give raises to some of his friends. Hence, option ‘e’ is correct answer.

7)

The Electronic Communications Privacy Act is federal statutes can be used to prosecute Internet-related criminal activities.

8)

A Daniel of Service attack is an intentional action designed to prevent legitimate users from making use of a computer service.

9)

In a SYN flood attack, an attacker sends a “ping” message to a number of known message broadcasting routers, falsely identifying a target machine as the originator of the message. Recipients of this message reply to the misidentified originator, thus saturating the target machine with “echo” messages from those recipients. Hence, option ‘a’ is correct answer.

10)

Security measures that are used by system administrators to reduce the threat of attacks throughout the internet include the following:

Hence, option ‘f’ is the correct answer.