ch2 Flashcards

1
Q

what enters the system without the users knowledge

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the two types of malware

A

viruses and worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

type of malware that is 100% reliant on the user

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

type of malware that can go through anywhere on the network

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what type of virus goes through great lengths to mask itself

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

type of malware that attaches to the end of lines of code being sent

A

appender infection (virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

type of malware that masks itself by holes in order to hide

A

Swiss cheese infection (virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

placed at random position in a host program

A

split infection (virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

program that uses a computer network. consumes resources or leaves behind a payload to harm infected systems. Such as deleting files or allowing remote control of a computer by an attacker.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

malware that hides itself in another application

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malware that encrypts a device

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malware that encrypts files

A

crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

software that is used by a hacker to hide its actions or presence of other malicious software

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software that gathers information

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

keyboard connector that records keys typed

A

keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

program that delivers advertising content in a manner unexpected and unwanted by the user

17
Q

computer code that lies dormant until it is triggered by a specific logical event.

A

logic bomb

18
Q

access to a computer, program, or service that circumvents normal security to give program access.

19
Q

an infected computer that is under control of an attacker

A

bot, or zombie

20
Q

a means of gathering information for an attack by relying on weakness of individuals

A

social engineering

21
Q

pretending to be someone else

A

impersonation

22
Q

sending an email claiming to be from a legitimate source

23
Q

type of phishing where specific individuals are targeted

A

spear phishing

24
Q

type of phishing where higher executives are targeted

25
unsolicited email
spam
26
uses graphical images of text in order to circumvent text based filters
image spam
27
false warning, usually claiming to come from IT
hoaxes
28
a malicious attack of a group that is directed toward a small group of specific individuals who visit the same website.
watering hole attack