History of Malware
-
Read the above.
No Answer.
-
Read the above.
No Answer, just carefully read the text to answer next questions.
-
Who re-designed the Creeper Virus?
Answe : Ray Tomlinson
-
How is data transferred through a network?
Answe : Packet Switching
-
Who created the first concept of a virus?
Answe : John von Neumann
-
What text did the Creeper program print to the screen?
Answe : I'm the creeper, catch me if you can!
-
What does ARPANET stand for?
Answe : Advanced Research Projects Agency Network
-
Which team created the network control program?
Answe : Network Working Group
-
What is the first virus commonly known as?
Answe : Creeper
-
Read the above.
Read carefully the text.
-
Who created Reaper?
Answer : Ray Tomlinson
-
What type of malware may Reaper be known as?
Answer : nematode
-
What was the first ever anti-virus program known as?
Answer : Reaper
-
What was Bob Thomas' main project to develop?
Answer : a resource-sharing capability
-
Research: What does API stand for?
Answer : Application Programming Interface
-
Read the information.
No Answer.
-
What is a modern day fork bomb also known as?
Answer : a denial of service attack
-
Was Rabbit one of the first malicious programs? (Y/N)
Answer : Y
-
What did the name "Wabbit" derive from?
Answer : looney tunes cartoons
-
Read the above.
No Answer.
-
When was PERVADE added to ANIMAL?
Answer : 1975
-
Did John think this was a good idea? (Y/N)
Answer : Y
-
What computers did the program spread across?
Answer : UNIVACs
-
What type of malware is ANIMAL also known as?
Answer : a trojan
-
Who built the wooden horse?
Answer : the Greeks
-
Read the above.
no Answer.
-
Which US Military regiment caught the virus?
Answer : US NAVY
-
How many lines long is the Elk Cloner poem?
Answer : 7
-
When was Elk Cloner written?
Answer : 1982
-
Is a boot sector virus more or less common in modern technology?
Answer : less
-
How long did it take Richard to write the program?
Answer : 2 weeks
-
Which Operating System was affected?
Answer : Apple II
- Read the above.
No Answer.
-
What commands were a very big way that allowed Morris to access the computers?
Answer : Berkeley r-commands
-
Who was one the first person prosecuted for the computer misuse act?
Answer : Robert Tappan Morris
-
What type of attack is a "Fork Bomb"?
Answer : Denial of services
-
When was this worm released?
Answer : 1988
-
How many computers did it infect within 15 hours?
Answer : 2000
-
What does rsh mean?
Answer : remote shell
-
Under which act was Morris arrested for?
Answer : 1986 Computer Fraud and Abuse act
-
Read the above.
No Answer.
-
What was the name of this virus?
Answer : Cascade
-
What file extensions would this virus infect?
Answer : .com
-
How many variants of there virus were possibly found?
Answer : 40
-
What operating system would the virus run on?
Answer : DOS
-
Which Operating System/Frame Work would Cascade try to avoid?
Answer : IBM
-
How many bytes would be added onto your file if it got infected?
Answer : 1704
-
Thanks!
No Answer.