184 Computer Security Flashcards
Which of the following is a general term that refers to a wide variety of damaging or annoying software programs?
Malware
Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
rootkit
Which of the following is NOT a technology typically used by spyware?
disk drive formatting software
AV software on a computer must have its files regularly updated by downloads from the Internet. These files contain (for each known virus) an extracted sequence of characters found in the virus that serve to uniquely identify it. What file is this?
signature file
Software that is more annoying than malicious and gets installed on a user computer and is generally free for a trial. What is this called?
PUP
Which type of malware will hide or remove all traces of evidence that may reveal the malware, such as log entries?
ROOTKIT
What type of spyware silently captures and stores each keystroke that a user types on the computer’s keyboard?
keylogger
What type of device is inserted between the computer keyboard connection and USB port for the purposes of stealing information?
keylogger
Which of the following is not a preventative feature of antimalware software?
application protection
What type of malware masquerades as performing a benign activity but also executes malicious code?
Trojan
An infected computer that is under the remote control of an attacker
zombie
An attacker who controls a botnet
bot herder
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
PUP
Hardware or software designed to limit the spread of malware over a network
firewall
Enhancements to the software to provide new or expanded functionality, but do not address security vulnerabilities
feature update
A malicious program designed to enter a computer via a network
worm
Computer code that lies dormant until it is triggered by a specific logical event
logic bomb
A database of viruses that is used to identify an infected file
signature file
A logical computer network of zombies under the control of an attacker
botnet