General Malware
Virus
Trojan Horse
Worm
Bomb
100
Malicious Software
What is Malware
100
How does a virus enter into your body?
What is mouth, nose, and breaks in skin
100
The people that won the battle of Troy.
Who are the Greeks
100
The most interesting trait about an earthworm
What is break in half and live
100
The type of malware a minefield is compared to.
What is a logic bomb
200
The most damaging type of malware
What is a computer worm.
200
Where computer viruses come from.
What is the Internet
200
Where the rest of the Greek army hide while waiting for the raid on the Trojan City.
Where is in boats around the coast of Troy
200
A computer worm carries what with it when it spreads to other computers?
What is a virus
200
The movie that we talked about with a Time Bomb
What is Batman
300
A pop-up that says "Free Virus Software" is an example of what
What is a Trojan Horse
300
An effect from a virus on a computer
What is blue screen, slow, frozen, pop-ups.
300
The Trojans never lost a battle because
What is the walls of the city were so high and strong they could not be breeched
300
The amount of money in damage caused by the ILOVEYOU virus
What is 5.5 billion dollars
300
What file was the Time Bomb attached to in the example I gave in class.
What is a song file
400
The 2 malware that do not multiply themselves.
What is Trojan Horse, and a Bomb
400
If a virus has been downloaded onto your computer it takes some time before the effects of the virus show, true or false?
What is true
400
The tale of Troy is found in 2 books.
What are the Illiad and the Aeneid
400
A VBScript is infectious code unlike a text document which is an ______________ script
What is executable.
400
The difference between a Logic and Time Bomb.
What is a Logic Bomb needs to be triggered and Time Bomb just goes off.
500
Name the 4 malware and what they were compared to.
What is Virus -> Biological Virus; Trojan Horse -> Trojan Horse from the Battle of Troy; Worm -> Earthworm, Logic Bomb -> mine/grenade; Time Bomb -> ticking Time Bomb
500
The 4 step cycle of a computer virus on a computer.
What is Enters through human action, attaches to document or program, multiplies itself, spreads through computer.
500
Explain what the Trojan horse in Troy has to do with a Trojan Horse malware on a computer.
What is they both appear to be a friendly, nice gift that end up leading to destruction.
500
Why the ILOVEYOU virus spread so fast and how it was stopped.
What is sent through e-mail from someone you knew and stopped by word of mouth.
500
How a logic bomb is different than a Trojan Horse
What is a Trojan horse looks pretty and appealing, a logic bomb is hidden in anything, it does not need to be pretty.
M
e
n
u