ch2 Flashcards

1
Q

what enters the system without the users knowledge

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the two types of malware

A

viruses and worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

type of malware that is 100% reliant on the user

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

type of malware that can go through anywhere on the network

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what type of virus goes through great lengths to mask itself

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

type of malware that attaches to the end of lines of code being sent

A

appender infection (virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

type of malware that masks itself by holes in order to hide

A

Swiss cheese infection (virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

placed at random position in a host program

A

split infection (virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

program that uses a computer network. consumes resources or leaves behind a payload to harm infected systems. Such as deleting files or allowing remote control of a computer by an attacker.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

malware that hides itself in another application

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malware that encrypts a device

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malware that encrypts files

A

crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

software that is used by a hacker to hide its actions or presence of other malicious software

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software that gathers information

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

keyboard connector that records keys typed

A

keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

program that delivers advertising content in a manner unexpected and unwanted by the user

17
Q

computer code that lies dormant until it is triggered by a specific logical event.

A

logic bomb

18
Q

access to a computer, program, or service that circumvents normal security to give program access.

19
Q

an infected computer that is under control of an attacker

A

bot, or zombie

20
Q

a means of gathering information for an attack by relying on weakness of individuals

A

social engineering

21
Q

pretending to be someone else

A

impersonation

22
Q

sending an email claiming to be from a legitimate source

23
Q

type of phishing where specific individuals are targeted

A

spear phishing

24
Q

type of phishing where higher executives are targeted

25
Q

unsolicited email

26
Q

uses graphical images of text in order to circumvent text based filters

A

image spam

27
Q

false warning, usually claiming to come from IT

28
Q

a malicious attack of a group that is directed toward a small group of specific individuals who visit the same website.

A

watering hole attack