Chapter 2 Flashcards

1
Q
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
A) Phreaking
B)Hacking
C)Social engineering
D)Reverse engineering
A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
The two types of malware that require user inervention to spread are:
A) Viruses and trojans
B) Rootkits and worms
C) Trojans and worms
D) Worms and viruses
A

Viruses and trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is malicious computer code that reproduces itself on the same computer?
A) virus
B) worm
C) adware
D) spyware
A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
A) stealth
B) appender
C) Swiss cheese
D) split
A

Swiss cheese

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What type of malware is heavily dependent on a user in order to spread?
A) Trojan
B) worm
C) rootkit
D) virus
A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A virus that infects an executable program file is known as?
A) macro virus
B) program virus
C) companion virus
D) boot sector virus
A

program virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
How many different Microsoft Windows file types can be infected with a virus?
A) 50
B) 60
C) 70
D) 80
A

70

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
A) A rootkit
B) A macro
C) A program
D) A process
A

A macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:
A) script
B) virus
C) Trojan
D) worm
A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
A) rootkit
B) backdoor
C) wrapper
D) shield
A

A) rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?
A) Trojan
B) logic bomb
C) macro virus
D) metamorphic virus
A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
A) Trojan horse
B) virus
C) bug
D) Easter egg
A

Easter egg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
A) Adware
B) Keylogger
C) Spam
D) Trojan
A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What is the term used to describe unsolicited messages received on instant messaging software?
A) ​Spam
​B) Spim
​C) Splat
D) Crust
A

​Spim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?
A) Oligomorphic malware
B) Polymorphic malware
C) Metamorphic malware
D) Statimorphic malware
A

Oligomorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is not one of the four methods for classifying the various types of malware?​
A) ​Circulation
B) ​Infection
C) ​Concealment
D) ​Source
A

​Source

17
Q
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​
A) ​Spam
​B) Adware
C) ​Watering Hole
D) ​Typo Squatting
A

​Watering Hole

18
Q
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?
A) ​Dumpster diving
B) ​Tailgating
C) ​Stalking
D) ​Shadowing
A

​Tailgating

19
Q
​What type of system security malware allows for access to a computer, program, or service without authorization?
​A) Botnet
B) ​Zombie
C) ​Backdoor
D) ​Command and Control
A

​Backdoor

20
Q
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​
A) ​Lockware
B) ​Ransomware
C) ​Stealware
D) ​Hostageware
A

Ransomware