Chapter 5 Flashcards

1
Q

Give 9 examples of malware

A

Computer Virus
Trojan
Spyware
Adware
Pharming
Click fraud
Ransomware
Rootkits
Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

A piece of code that is designed to replicate itself throughout the computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus usually designed to do?

A

To delete or corrupt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm?

A

It behaves just like a virus, but does not harm files. Instead, it tries to copy itself so many times that the whole system runs out of resources and crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a trojan?

A

A trojan appears to be a harmless application. You use it, but meanwhile it is running in the background it maybe letting someone else access to your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is adware?

A

This malware can force your browser to display unwanted pop-up advertisements. It can also cause pages that you didn’t request to open up taking you to unwanted web sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is click fraud?

A

Uses your computer resources to open certain web sites and send a mouse click to the adverts. Every click makes them money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is malware short for?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is pharming?

A

Pharming malware will infect your browser, redirecting you to an identical looking, but fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does pharming work?

A

It tells your browser to look for a different IP address to the genuine site to that of the fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is spyware?

A

Spyware stays hidden out of view and is designed to spy on your computer, looking for personal information, passwords and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does spyware work?

A

Using a key logger to record every key pressed on the keyboard. It might also take screen shots. This information is then sent secretly over the internet to the criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ransomware?

A

Ransomware encrypts critical files and data, making them unusable. Eventually it presents the user with a ransom, demanding money be sent to the attackers to unlock the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is scareware?

A

Scareware will cause a pop-up to appear on your screen which will say something like ‘Your computer has a virus. To clear the problem please purchase this software’, and a link is provided in the pop-up (often containing malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are rootkits?

A

Rootkits give other people permissions and access to your computer, allowing them to take it over remotely and do whatever they like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the internet

A

interconnected network (worldwide collection), not tangible (so users can send and receive emails, online chatting, collection of devices and networks)

17
Q

what is www

A

world wide web - web browser software, only part of the internet, based on hypertext transfer protocol

18
Q

URLs

A

browsers interpret Hypertext mark-up language sent from websites and produce the results on the users screen. Uniform resource locators are text addresses to access websites

19
Q

format of a URL

A

protocol (http or https)://website address (domain host, domain name, domain type, country code) /path (sometimes omitted and made part of the website) /filename

20
Q

HTTP and HTTPs

A