1.2 Examples Flashcards

1
Q

monitors computer and user’s activities

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

left by an old employee

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

both will demand that a ransom be paid to regain access to data/computers

A

Cryptoware and Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

becomes apart of virus system so anti-virus/anti-malware can’t detect it

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

downloads password files and compare hashes

A

Offline Password Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If an attacker captures an encrypted message and knows the unencrypted plaintext of the message, they can use both sets of data to discover the encryption and decryption method

A

Plaintext/Unencrypted Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly