Ch.2 Flashcards

1
Q

software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

adware

A

software program that delivers advertising content in a manner that is unexpected and unwanted by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

virus that goes to great lengths in order to avoid detection. What is being defined

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define backdoor

A

software code that gives access to program or a service that circumvents normal security protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker who controls a botnet. What is being defined

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define botnet

A

logical computer network of zombies under the control of an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The structure by which a bot herder gives instruction to zombies in a botnet

A

command and control (C&C or C2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define computer virus (virus)

A

malicious computer code that, like its biological counterpart, reproduces itself on the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The act of digging through trash receptacles to find information that can be useful in an attack

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define hoax

A

a false warning designed to trick users into changing security settings on their computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A social engineering attack that involves masquerading as a real or fictitious character and then playing out the role of that person on a victim. What is being defined

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define keylogger

A

software or a hardware device that captures and stores each keystroke that a user types on the computer’s keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

computer code that lies dormant until it is triggered by a specific logical event. What is being defined

A

logic bomb

*specific logical event such as going to be fired on a certain day or to force a contractor to hire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define macro

A

a series of instructions that can be grouped together as a single command, often used to automate a complex set of tasks or a repeated series of tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a computer virus that is written in a script known as a macro. What is being defined

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

define malware

A

software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

malware that rewrites its own code and thus appears different each time it is executed

A

metamorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

define oligomorphic malware

A

malware that changes its internal code to one of a set number of predefined mutations whenever it is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a phishing attack that automatically redirects the user to a fake site. What is being defined

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

define phishing

A

sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

malware code that completely changes from its original form whenever it is executed. What is being defined

A

polymorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

define program virus

A

a computer virus that infects executable program files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

malware that prevents a user’s device from properly operating until a fee is paid. What is being defined

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

define rootkit

A

a set of software tools used by an attacker to hide the actions or presence of other types of malicious software

25
Q

watching an authorized user enter a security code on a keypad. What is being defined

A

shoulder surfing

26
Q

define social engineering

A

a means of gathering information for an attack by relying on the weaknesses of individuals

27
Q

unsolicited email. What is being defined

A

spam

28
Q

define spear phishing

A

a phishing attack that targets only specific users

29
Q

a variation of spam, which targets instant messaging users instead of email users. What is being defined

A

spim

30
Q

define spyware

A

a general term used to describe software that spies on users by gathering information without consent

31
Q

when an unauthorized individual enters a restricted-access building by following an authorized user. What is being defined

A

tailgating

32
Q

define Trojan horse (trojan)

A

an executable program that is advertised as performing one activity but which actually performs a malicious activity

33
Q

redirecting a user to a fictitious website based on a misspelling of the URL. also called URL hijacking. What is being defined

A

typo squatting

34
Q

define URL hijacking

A

redirecting a user to a fictitious website based on a misspelling of the URL. Also called typo squatting

35
Q

a phishing attack uses telephone calls instead of emails. What is being defined

A

vishing

36
Q

define watering hole attack

A

a malicious attack that is directed toward a small group of specific individuals who visit the same website

37
Q

a phishing attack that targets only wealthy individuals. What is being defined

A

whaling

38
Q

define worm

A

a malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system

39
Q

an infected computer that is under the remote control of an attacker. What is being defined

A

zombie

40
Q

A (n) _____ requires a user to transport it from one computer to another.

a. worm
b. rootkit
c. virus
d. adware

A

c

41
Q

Which of these is NOT an action that a virus can take?

a. transport itself through the network to another device
b. cause a computer to crash
c. erase files from a hard drive
d. reformat the hard disk drive

A

a

42
Q

Which malware locks up a user’s computer and then displays a message that purports to come from a law enforcement agency?

a. virus
b. ransomware
c. worm
d. Trojan

A

b

43
Q

Which of the following is an attempt to influence a user by coercion?

a. authority
b. social proof
c. intimidation
d. familiarity

A

c

44
Q

A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a ______.

a. virus
b. worm
c. Trojan
d. logic bomb

A

c

45
Q

What should you do to completely remove a rootkit from a computer?

a. Flash the ROM BIOS
b. Erase and reinstall all files in the WINDOWS folder
c. Expand the Master Boot Record
d. Reformat the hard drive and reinstall the operating system

A

d

46
Q

Which of these could NOT be defined as a logic bomb?

a. Erase all data if John Smith’s name is removed from the list of employees
b. Reformat the hard drive three months after Susan Jones left the company
c. Send spam email to all users in the company on Tuesday
d. If the company’s stock price drops below $10, then credit Jeff Brown with 10 additional years of retirement credit

A

c

47
Q

What is it called when a user makes a typing error when entering a URL that takes him to an imposter website?

a. URL variance
b. typo squatting
c. spell scraping
d. work hijacking

A

b

48
Q

Which of these is a general term used for describing software that gathers information without the user’s consent?

a. adware
b. spyware
c. scrapware
d. pullware

A

b

49
Q

Which statement regarding a keylogger is NOT true?

a. hardware keyloggers are installed between the keyboard connector and computer keyboard USB port
b. Software keyloggers are easy to detect
c. Keyloggers can be used to capture passwords, credit card numbers, or personal information
d. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet

A

b

50
Q

The preferred method today of bot herders for command and control of zombies is ______.

a. Internet Relay Chat (IRC)
b. botnets
c. Hypertext Transport Protocol (HTTP)
d. spam

A

c

51
Q

A watering hole attack is directed against _____.

a. wealthy individuals
b. attackers who send spam
c. all users of a large corporation
d. users who access a common website

A

d

52
Q

______ sends phishing messages only to wealthy individuals.

a. Spear phishing
b. Target phishing
c. Microing
d. Whaling

A

d

53
Q

What is unsolicited instant messaging called?

a. spim
b. spam
c. vishing
d. SMS phishing

A

a

54
Q

Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed?

a. aliasing
b. impersonation
c. luring
d. duplicity

A

b

55
Q

How can an attacker use a hoax?

a. by sending out a hoax, an attacker can convince a user to read his email more often
b. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings
c. A user who receives multiple hoaxes could contact his supervisor for help
d. Hoaxes are not used by attackers today

A

b

56
Q

Which of these items retrieved through dumpster diving would NOT provide useful information?

a. calendars
b. memos
c. organizational charts
d. books

A

d

57
Q

_______ is following an authorized person through a secure door.

a. Tagging
b. Backpacking
c. Tailgating
d. Caboosing

A

c

58
Q

Each of these is a reason why adware is scorned EXCEPT ______.

a. it displays the attacker’s programming skills
b. it can interfere with a user’s productivity
c. it displays objectionable content
d. it can cause a computer to crash or slow down

A

a

59
Q

What is the term used for an attacker who controls multiple zombies in a botnet?

a. zombie shepherd
b. rogue IRC
c. bot herder
d. cyber-robot

A

c