Lesson 2 Flashcards

1
Q

attaches itself to a program, file, or disk.
When the program is executed, it activates and replicates itself.

A

VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Independent program that replicates itself and sends copies from computer to computer across network connections.

A

WORMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware logic executes upon certain conditions. The program is often used for otherwise legitimate reasons.

A

LOGIC BOMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Masquerades as a benign program while quietly destroying data or damaging your system

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

manipulates people into performing actions or divulging confidential information.

A

SOCIAL ENGINEERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A seemingly trustworthy entity asks for sensitive information such as SSN, credit card numbers, login IDs or passwords via e-mail.

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

leads to a counterfeit webpage which collects important information and submits it to the owner.

A

PHARMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attacker pretends to be your final destination on the network. When a person tries to connect to a specific destination, an attacker can mislead him to a different service and pretend to be that network access point or server

A

MAN IN THE MIDDLE ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Upon penetrating a computer, a hacker may install a collection of programs.
Modifies the Operating System.

A

ROOTKIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An unauthorized acquisition of electronic data that compromises the security, confidentiality or integrity of “personal information”.

A

GEORGIA DATA BREACH NOTIFICATION LAW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Some Symptoms for Identifying Security Compromises:

A
  • Antivirus software detects a problem.
  • Disk Space disappears unexpectedly.
  • Pop-ups suddenly appear
  • The computer slows down to a crawl.
  • The mouse pointer moves by itself.
  • The computer shuts down or reboots.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some Symptoms for Malware/ Spyware Detection:

A
  • Changes to your browser homepage.
  • Ending up on a strange site when conducting a search.
  • System-based firewall is turned off automatically.
  • Excessive pop-up windows.
  • Lots of network activity while not active.
  • Poor system performance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of Leading Threats?

A
  • Virus
  • Worms
  • Logic Bombs
  • Trojan Horses
  • Social Engineering
  • Rootkits
  • Botnets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer-savvy
programmer creates
attack software.

Possible question?

A

CYBER-CRIMINALS
duh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unsophisticated computer users who know how to execute programs.

Possible question?

A

SCRIPT-KIDDIES
just like us students lol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Create and sell bots, generate spams and sell credit numbers.

Possible question?

A

CRIMINALS
just criminals, no cyber.
Harhar

17
Q

BEST PRACTICES TO AVOID ONLINE THREATS

A
  • ANTI-VIRUS and ANTI-SPYWARE SOFTWARE
  • HOST-BASED FIREWALLS
  • Protect your Operating System
  • Use strong passwords
  • Avoid Social Engineering