184 Computer Security Flashcards

1
Q

Which of the following is a general term that refers to a wide variety of damaging or annoying software programs?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT a technology typically used by spyware?

A

disk drive formatting software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AV software on a computer must have its files regularly updated by downloads from the Internet. These files contain (for each known virus) an extracted sequence of characters found in the virus that serve to uniquely identify it. What file is this?

A

signature file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software that is more annoying than malicious and gets installed on a user computer and is generally free for a trial. What is this called?

A

PUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of malware will hide or remove all traces of evidence that may reveal the malware, such as log entries?

A

ROOTKIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of spyware silently captures and stores each keystroke that a user types on the computer’s keyboard?

A

keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of device is inserted between the computer keyboard connection and USB port for the purposes of stealing information?

A

keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not a preventative feature of antimalware software?

A

application protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of malware masquerades as performing a benign activity but also executes malicious code?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An infected computer that is under the remote control of an attacker

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attacker who controls a botnet

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user

A

PUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware or software designed to limit the spread of malware over a network

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Enhancements to the software to provide new or expanded functionality, but do not address security vulnerabilities

A

feature update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A malicious program designed to enter a computer via a network

17
Q

Computer code that lies dormant until it is triggered by a specific logical event

A

logic bomb

18
Q

A database of viruses that is used to identify an infected file

A

signature file

19
Q

A logical computer network of zombies under the control of an attacker