Chapter 3 Flashcards

1
Q

____ is a general term that refers to a wide variety of damaging or annoying software programs.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The two types of malware that have the primary objective of infecting a computer system are ____.

A

viruses and worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ infection injects portions of the code throughout the program’s executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).

A

Swiss cheese

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ____ self-replicates between computers (from one computer to another).

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A computer ____ is a program advertised as performing one activity but actually does something else.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ attacks are often the means by which an attacker will perform an arbitrary code execution

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An infected ‘‘robot’’ computer is known as a ____.

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. This is known as ____.

A

Denying Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is software that displays a fictitious warning to the user in the attempt to “scare” the user into an action, such as purchasing additional software online to fix a problem that in fact does not exist.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security ____ is a general software security update intended to cover vulnerabilities that have been discovered since the program was released.

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AV software on a computer must have its ____ files regularly updated by downloads from the Internet.

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ____ account is designed for everyday computing activities and allows for some settings to be modified.

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One of the best defenses against attacks is to create ____ on a regular basis.

A

Data Backups

17
Q

A ____ device is similar to a portable USB hard drive except it has additional ‘‘intelligence’’ that allows all devices connected to the computer network to access it.

A

Network attached storage

18
Q

A general term that refers to a wide variety of damaging or annoying attack software programs

A

Malware

19
Q

General term used to describe software that spies on users by gathering information without consent, thus violating their privacy

A

Spyware

20
Q

Virus that first attaches itself to the end of a file

A

Appender Infection

21
Q

Software program that delivers advertising content in a manner that is unexpected and unwanted by the user

A

Adware

22
Q

Attacker in control of botnets

A

Bot herder

23
Q

Written in a script to automate a complex series of tasks into one command

A

Macro Virus

24
Q

One of the first viruses found on a microcomputer

A

Elk Cloner

25
Q

Also called a remote code execution, or RCE

A

Arbitrary code execution

26
Q

An agent that reproduces inside a cell

A

Biological Virus