IT - Viruses Flashcards

1
Q

Identity Theft & Hackers; Computer Viruses; Online Annoyances & Social Engineering

A

Threats to Digital Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most financially damaging

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

White-Hat, Black-Hat, Grey-Hat

A

Types of Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethical Hackers

A

White-Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacker control of a computer

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Causes system shut down; overload of requests

A

DOS (Denial of Service) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus - Executes when a computer boots up

A

Boot-Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus - Executes when certain conditions or dates are reached

A

Logic/Time Bomb Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus - Spread on their own w/ no human interaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus - Series of commands with malicious intent

A

Script & Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus - Spread as attachments to email

A

E-mail Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus - Holds files “hostage” by encrypting them (ask for ransom)

A

Encryption Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virus that Is able to mutate & change (hard to catch)

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware that hacks and displays advertisements

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware that hacks and transmits information

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Small text files received when you visit a website - helps with marketing, may invade privacy but is not a threat

A

Cookies

17
Q

Lures people into revealing information

A

Phishing

18
Q

Malicious code that is planted on a computer to gather information

A

Pharming

19
Q

Hardware/software that is included with Windows & OSX

A

Firewall

20
Q

14+ characters; combination of letters, numbers, symbols, no dictionary words

A

Strong Password guidelines

21
Q

Incremental (partial) & Image (system)

A

Types of Backup