100% found this document useful (1 vote)
169 views

Unit of Competence: Module Title: TTLM Code: Name: - Date

This document contains an instruction sheet for a training module on protecting application and system software. The sheet includes questions to test identification of different types of malware like viruses, worms, and spam. It also includes multiple choice, enumeration, and matching questions related to user accounts, viruses, antivirus software, and methods of preventing computer infections. The questions cover topics like types of user accounts, reasons for creating viruses, ways to prevent infections, and characteristics of different malware like file viruses, rootkits, and spam.

Uploaded by

Kefelegn Gulint
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
169 views

Unit of Competence: Module Title: TTLM Code: Name: - Date

This document contains an instruction sheet for a training module on protecting application and system software. The sheet includes questions to test identification of different types of malware like viruses, worms, and spam. It also includes multiple choice, enumeration, and matching questions related to user accounts, viruses, antivirus software, and methods of preventing computer infections. The questions cover topics like types of user accounts, reasons for creating viruses, ways to prevent infections, and characteristics of different malware like file viruses, rootkits, and spam.

Uploaded by

Kefelegn Gulint
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Entoto TVET College

Training, Teaching and Learning Materials Development

Unit of Competence: Protect Application and System Software


Module Title: Protecting Application and System Software
TTLM Code: ICT ITS1 TTLM1 0511

Name: ____________________________ Date: _____________________

Instruction: Answer all the questions listed below, if you have some clarifications- feel free to
ask your teacher.

I. IDENTIFICATION: Identify the following. Write your answer on the space


provided before each number.

___________________ 1. It is an account created for regular users of the computer.


___________________ 2. It is the primary means of access for real people to the system.
___________________ 3. It is an account that used when someone needs to access the computer for
a short period of time.
___________________ 4. What user accounts have full system access?
___________________ 5. This virus doesn't replicate, but can spread.
___________________ 6. It is a small software program that is specifically designed to spread
between computers and hinder basic computer functions.
___________________ 7. This virus attacks files on your computer.
___________________ 8. It can replicate and spread to other computers. Also attacks other program

___________________ 9. These viruses are written specifically to infect Microsoft Office documents
(Word, Excel PowerPoint, etc.)
___________________10. This virus is designed to infect both the boot sector and files on your
computer.
___________________11. It is design to attack boot sector, causing your PC to refuse to start at all.

___________________12. This malware force your computer to make phone calls.


___________________13. What do you call the spreading part of the virus?
___________________14. Computer viruses are called viruses because they share some of the
traits of what?
___________________15. What is another name for software that has an evil intent.
___________________16. This Malware collects personal information about you, like your passwords
or other information you type into your computer.
___________________17. What is the most common way that a virus can get to your computer?

___________________18. Nowadays what do the viruses utilize for them to spread?


___________________19. It is a program or piece of hardware that helps screen out viruses, worms
and hackers which are attempting to interact with your computer via
the Internet.
___________________20. What is a simple command that enables the executable file to run
automatically?
___________________21. This virus detection strategy compares the contents of a file to
a dictionary of virus signatures
___________________22. It is used to prevent, detect, and remove  malware, including but not
limited to computer viruses, computer worm, trojan horses, spyware 
and adware.
___________________23. What do you call a wrong detection where a legitimate file was mistakenly
detected as a virus?

Learning Guide Date: 05-2011 Page 1 of 3


1st Revision Author: Noel P. Cuevas, IT – Entoto TVET College
Entoto TVET College
Training, Teaching and Learning Materials Development
___________________24. It prevent unknown programs and processes from accessing the system.
___________________25. It floods the Internet with many copies of the same message.

___________________26. It is a type of spam that send a single message to 20 or more Usenet


newsgroups.
___________________27. This type of spam is a significant chunk of junk-mail text.
___________________28. This type of spam delivers viruses and other types of malware.
___________________29. It is a type of spam that targets individual users with direct mail messages.
___________________30. These offerings use sophisticated algorithms to scan each incoming
message for signs that it may contain spam.

II. ENUMERATION: Enumerate the following requirements for each question.


 Give the three (3) levels of user accounts.
1.
2.
3.
 Give the three (3) Benefits of having multiple user accounts in your computer.
1.
2.
3.
 What are three (3) different kinds of viruses
1.
2.
3.
 Give three (3) reasons why people create a virus
1.
2.
3.
 What are the three (3) ways to prevent your computer to get infected with virus?
1.
2.
3.

III. MULTIPLE CHOICE: Encircle the letter of the correct answer among the choices provided.

1. All are viruses except one which encrypt parts of themselves or otherwise modify themselves
as a method of disguise.
a. Polymorphic c. Metamorphic
b. Multimorphic d. Oligomorphic
2. It is a type of malware that was designed to gain administrative-level control over a computer
system without being detected.
a. File Virus c. Rootkit virus
b. Trojan Virus d. Boot Sector Virus
3. Which is more destructive?
a. False Positive c. True Positive
b. False Negative d. True Negative
4. What is the drawback of antivirus software.
a. It can boost computer performance c. It can speedup computer performance
b. It can repair computer performance d. It can impair computer performance
5. To prevent a virus to enter to your computer what operating system do you need to install to your
computer?

Learning Guide Date: 05-2011 Page 2 of 3


1st Revision Author: Noel P. Cuevas, IT – Entoto TVET College
Entoto TVET College
Training, Teaching and Learning Materials Development
a. Windows XP c. Windows 7
b. UNIX d. Windows Vista

6. What account you must have so you can add new user account to the computer?
a. Guest c. Administrator
b. Limited d. Both Limited and Administrator
7. Melissa Virus is an example of what virus?
a. Adware c. Email virus
b. Spyware d. File Virus
8. All are spams filtering tools except for one.
a. Firewalls c. Anti-malware
b. Spam filters d. Hardware
9. This type of spam Hides behind the names of respected retailers, financial institutions,
businesses, charities and government bodies.
a. Phishing c. Malware Delivery
b. Advertising d. Scam
10. All are types of IP media except for one.
a. IM c. Blogs
b. VoIP d. Flash drive
11. You cannot guest account or profile when you log on to this account.
a. Administrator c. Guest
b. Limited d. Both Administrator and Limited
12. This type of spam is used to promote an entire spectrum of products and services, from
software to real estate to questionable medical and nutritional offerins.
a. Phishing c. Malware Delivery
b. Advertising d. Scam
13. Spam now constitute an overwhelming majority of what?
a. Scam c. Email traffic
b. Malware d. Virus
14. This spam was called as “hit and run” spamming.
a. The theft of resources c. The “Oceans of Spam” problem
b. The free ride d. The garbage
15. It is an account created for regular users of the computers.
a. Guest Account c. Personal Account
b. Limited Account d. Administrator Account

IV. MATCHING TYPE: Match Column A with Column B. Write the letter of the correct
answer on the space provided before the number.
A B
______ 1. Boot sector virus A. nowadays the virus utilize to spread
______ 2. Polymorphic virus B. the spreading part of the virus
______ 3. Cloud Antivirus C. spam that poses tragically ill children and other stock types
______ 4. Brend Fix D. the receiver pays more than the sender
______ 5. Multipartite virus E. bootable disk
______ 6. AVG Rescue CD F. virus that infects both boot sector and files
______ 7. The free ride G. the one who conducted first removal of virus
______ 8. Scam H. uses lightweight agent software
______ 9. Infection Phase I. virus that alters its code when they infect another computer
______ 10. Autorun J. virus that attacks boot sector

Learning Guide Date: 05-2011 Page 3 of 3


1st Revision Author: Noel P. Cuevas, IT – Entoto TVET College

You might also like