Chapter 2 Key Terms Flashcards
1
Q
spreading rapidly to other systems to impact a large number of users payload RAT circulation trojan
A
circulation
2
Q
the nefarious actions the malware performs flatulence concealment payload capabilitie payload
A
payload capabilities
3
Q
a false warning, often contained in an email message claiming to come from the IT department hoax phishing whaling impersonation
A
Hoax
4
Q
to watch an individual entering the security code on a keypad; a user casually observes someone entering secret information, such as the security code on a door keypad shoulder surfing spear phishing tailgating watering hole attack
A
shoulder surfing
5
Q
delivers advertising content in a manner that is unexpected and unwanted by the user backdoor impersonation adware spyware
A
adware
6
Q
avoiding detection by hiding its presence from software scanners that are looking for malware concealment virus rootkit worm
A
concealment
7
Q
digging through trash receptacles to find information that can be useful in an attack watering hole attack tailgating dumpster diving shoulder surfing
A
dumpster diving
8
Q
a malicious program that uses a computer network to replicate trojan concealment virus worm
A
worm
9
Q
used to delete data; a computer code that is typicaly added to a legitimate program but lies dormant until a specific logical event triggers it logic bomb backdoor time bomb whaling
A
logic bomb
10
Q
an executable program that masquerades as performing a benign activity but also does something malicious worm trojan RAT virus
A
trojan
11
Q
once an authorized person opens the door, one or more individuals can follow behind and also enter dumpster diving mantrap shoulder surfing tailgating
A
tailgating
12
Q
gives access to a computer, program, or service that circumvents any normal security protections social engineering rootkit spyware backdoor
A
backdoor
13
Q
gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols trojan worm RAT virus
A
RAT
14
Q
a means of gathering information for an attack by relying on the weaknesses of individuals phishing whaling gregarious social engineering
A
social engineering
15
Q
sending millions of generic emails; targetting specific users vishing whaling phishing spear phishing
A
spear phishing