Malware Flashcards
Malware that restricts access to a computer system by encrypting files or locking the entire system until the user performs requested actions is known as:
Ransomware
Stand-alone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
Worm
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
What is adware?
Software that displays advertisements
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
A malware-infected networked host under remote control of a hacker is commonly referred to as:
Bot
Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Botnet
Which type of Trojan enables unauthorized remote access to a compromised system?
RAT (remote access trojan)
Malicious code activated by a specific event is called:
Logic bomb
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Backdoor
Unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:
Social engineering
A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select all that apply)
Phishing and Vishing
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:
Phishing
Phishing scams targeting a specific group of people are referred to as:
Spear phishing