1 Flashcards

1
Q

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

  • Adware
  • Malware
  • Ransomware
  • Spyware
A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements apply to the definition of a computer virus? (Select 3 answers)

  • A self-replicating computer program containing malicious segment.
  • Requires its host application to be run to make the virus active.
  • A standalone malicious computer program that replicates itself over a computer network.
  • Can run by itself without any interaction.
  • Attaches itself to an application program or other executable component.
  • A self-contained malicious program or code that does need a host to propagate itself.
A
  • A self-replicating computer program containing malicious segment.
  • Requires its host application to be run to make the virus active.
  • Attaches itself to an application program or other executable component.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the terms listed below refers to an example of a crypto-malware?

Backdoor
Ransomware
Keylogger
Rootkit

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Grayware
Adware
Ransomware
Spyware

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

Spyware
Worm
Trojan
Spam

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit
Spyware
Backdoor
Trojan

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following answers lists an example of spyware?

Keylogger
Vulnerability scanner
Computer worm
Packet sniffer

A

Keylogger

Akeyloggeris a technology that tracks and records consecutive key strokes on a keyboard. Because sensitive information such as usernames and passwords are often entered on a keyboard, akeyloggercan be a very dangerous technology.Keyloggersare often part of malware, spyware or an external virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is adware?

Unsolicited or undesired electronic messages.
Malicious program that sends copies of itself to other computers on the network.
Software that displays advertisements.
Malicious software that collects information about users without their knowledge.

A

Software that displays advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious software collecting information about users without their knowledge/consent is known as:

Crypto-malware
Adware
Ransomware
Spyware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malware-infected networked host under remote control of a hacker is commonly referred to as:

Trojan
Worm
Bot
Honeypot

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of Trojan enables unauthorized remote access to a compromised system?

pcap
RAT
MaaS
pfSense

A

RAT

A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.RATsare usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malicious code activated by a specific event is called:

Backdoor
Logic bomb
Dropper
Retrovirus

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

Logic bomb
Trojan horse
Rootkit
Backdoor

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

Shoulder surfing
Privilege escalation
Social engineering
Penetration testing

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select all that apply)

  • Phishing
  • Watering hole attack
  • Social engineering
  • Bluejacking
  • Vishing
A

Phishing

17
Q

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

  • Phishing
  • Privilege escalation
  • Backdoor access
  • Shoulder surfing
A

Phishing

18
Q

Phishing scams targeting a specific group of people are referred to as:

  • Vishing
  • Spear phishing
  • Spoofing
  • Whaling
A

Spear phishing

19
Q

Phishing scams targeting people holding high positions in an organization or business are known as:

Vishing
Bluesnarfing
Whaling
Bluejacking
Pharming

A

Whaling

20
Q

The practice of using a telephone system to manipulate user into disclosing confidential information is called:

  • Whaling
  • Spear phishing
  • Vishing
  • Pharming
A

Vishing

21
Q

What is tailgating?
* Acquiring unauthorized access to confidential data.
* Looking over someone’s shoulder to get information.
* Gaining unauthorized access to restricted areas by following another person.
* Manipulating a user into disclosing confidential information.

A

Gaining unauthorized access to restricted areas by following another person.

22
Q

Which social engineering attack relies on identity theft?

  • Impersonation
  • Dumpster diving
  • Watering hole attack
  • Shoulder surfing
A

Impersonation

23
Q

“In computer security, the term ““Dumpster diving”” is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.”

True
False

A

True

24
Q

A situation in which an unauthorized person can view another user’s display or keyboard to learn their password or other confidential information is referred to as:

  • Spear phishing
  • Tailgating
  • Shoulder surfing
  • Spoofing
A

Shoulder surfing