Chapter 2

1. C Viruses require a user to execute an infected program. Worms can spread to other computers using the network without any user intervention. Both are malware.

2. True A buffer overflow occurs when a program receives unexpected code that causes an error, overflowing the application’s memory buffer and exposing system memory.

3. B A Trojan horse appears to be one thing such as a utility or a game, but it has a hidden malicious component.

4. False Botnets continue to grow. One botnet (the Rustock botnet) includes more than 1 million clones and sends out more than 40 billion spam emails a day.

5. Botnets It’s estimated that 88 percent of spam is sent by botnets and about 89 percent of all email is spam.

6. Microsoft Security ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.