Malware Flashcards

1
Q

Malware that restricts access to a computer system by encrypting files or locking the entire system until the user performs requested actions is known as:

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stand-alone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is adware?

A

Software that displays advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malicious software collecting information about users without their knowledge/consent is known as:

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A malware-infected networked host under remote control of a hacker is commonly referred to as:

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of Trojan enables unauthorized remote access to a compromised system?

A

RAT (remote access trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious code activated by a specific event is called:

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select all that apply)

A

Phishing and Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing scams targeting a specific group of people are referred to as:

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing scams targeting people holding high positions in an organization or business are known as:

A

Whaling

17
Q

The practice of using a telephone system to manipulate user into disclosing confidential information is called:

A

Vishing

18
Q

What is tailgating

A

Gaining unauthorized access to restricted areas followed by another person

19
Q

Which social engineering attack relies on identity theft?

A

Impersonation

20
Q

In computer security, the term “Dumpster diving” is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.

A

True

21
Q

A situation in which an unauthorized person can view another user’s display or keyboard to learn their password or other confidential information is referred to as:

A

Shoulder surfing

22
Q

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

A

Malware