Miscellaneous Quiz / Defense4

Random Miscellaneous Quiz

Can you name the Defense4?

 Plays Quiz not verified by Sporcle

Forced Order
Support Sporcle.
Go Orange.
Score 0/23 Timer 15:00
question
Vienna and suicide are famous examples of what kind of virus that saves the overwritten instructions in the virus
What are the 3 major tasks of anti-virus software:
This type of virus creator often searched for space within a file that is filled with zeros or ascii blanks
in this type of virus, the application code is compressed and the virus code plus decompressor code fits into the space that was save
these are typical when comparing self-extracting archives and compressed viruses
this is a boot sector virus created in 1987
this (in terms of anti-virus detection) is the false claim that a virus has been detected
This worm secretly monitors and reprograms industrial control systems- contains 4 zero-day vulnerabilities an2 stolen digital certificates
Beginning of file with destructive overwrite: 2 methods: _______*.exe with a virus *.exe or _____ only the _____
this virus overwrote at a random location in the *.exe file
 
most scanners are typically run through user settings. these are called
question
this (in terms of anit-virus detection) is the failure to detect a virus on a system being scanner
an example of an IAT replacement (EPO) virus
The ____ is the function pointer thable that exports the API that the user application is presenting to outside callers; these functions can be saved in virus body and replaced wit
In terms of detection errors, which cause more trouble: false pos or flase neg
this section gives information to be used if the program has to be relocated during execution; ie reloaded at a different load point and provides a large cavity for viruses to use
*.exe, *.com, and *.bat are examples of
This 1191 DOS normal COM example used many techniques including appaneding, memory resistant, hooks interrupts, multiple variants
to find a function call, a virus can scan the _____ section
virus detection is generally done through on-demand or on-access ____
these types of tools are often used to examine infected code
This type of virus obscures its own entry point by finding a call instruction in the targeted PE file and 'hijacking' the call so that the virus code is called instead

You're not logged in!

Compare scores with friends on all Sporcle quizzes.
OR
Log In

From the Vault

2000s Artists on Their Album Cover

by nscox

These artists just need to be front and center.
Remove Ads.
Support Sporcle.
Get the best of Sporcle when you Go Orange. This ad-free experience offers more features, more stats, and more fun while also helping to support Sporcle. Thank you for becoming a member.

Show Comments

Extras

Created Feb 22, 2011ReportNominate

Top Quizzes Today


Score Distribution

Your Account Isn't Verified!

In order to create a playlist on Sporcle, you need to verify the email address you used during registration. Go to your Sporcle Settings to finish the process.

Report this User

Report this user for behavior that violates our Community Guidelines.

Details: