Chapter 2 - Malware And Social Engineering Attacks Flashcards

1
Q

Malware

A

Software that enters a computer system without the users knowledge or consent and then performs an unwanted and usually harmful action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The four traits that a malware can possess

A

1) circulation
- viruses
- worms
2) infection
- Trojans
- ransomware
- crypto-malware
3) concealment
- rootkit
4) payload capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virus

A

Malicious computer code that reproduces itself on the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worm

A

A malicious program that uses a computer network to replicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

An executable program that is advertised as performing one activity but which also performs a malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote access Trojan (RAT)

A

A Trojan that also gives the threat agent unauthorized remote access to the victims computer by using specially configured communication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Malware that prevents a users device from properly and fully functioning until a fee is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Crypto-malware

A

Malware that encrypts all the files on the device so that they cannot be opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit

A

Malware that hides its presence or presence of other malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Tracking software that is deployed without the consent or control of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keylogger

A

Spyware that silently captures and stores each keystroke that a user types on the computers keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adware

A

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic bomb

A

Computer code that lies dormant until it is triggered by a specific logical event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Back door

A

Software code that gives access to a computer, program, or a service that circumvents any normal security protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bot (zombie)

A

An infected computer that is under the remote control of an attacker for the purpose of launching attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

17
Q

Spear phishing

A

A phishing attack that targets only specific users.

18
Q

Whaling

A

A phishing attack that targets only wealthy individuals.

19
Q

Vishing

A

A phishing attack that uses telephone calls instead of emails.

20
Q

Hoax

A

False warning.

21
Q

Watering hole attack

A

A malicious attack that is directed toward a smaller group of specific individuals by embedding malware in a website frequented by these individuals.

22
Q

Tailgating

A

When an unauthorized individual enters a restricted-access building by following an authorized user.

23
Q

Shoulder surfing

A

Watching a user enter secret information. (On a keypad)