malware Flashcards

1
Q

a program that attempts to damage a computer system and replicate itself to other computer systems

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a self replication program

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a program disguised as legitimate or desirable

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a computer infected with malware that allows remote software updates

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

zombies are control by a command and control center, the administrator is know as the

A

zombie master

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a group of zombie computers

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a set of programs that allows attackers to maintain permanent administrator access to a computer

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this is designed to execute only under predefined conditions, and lays dormant until the predefined conditions are met

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software installed without user’s consent, designed to intercept or take partial control

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

it monitors actions that denotes personal preferences, and then send pop-ups and add

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

it denies access to a computer system until the user pays

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a scam to fool user into thinking they have some form of malware on their system

A

scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

designed to perpetrate identity theft to allow access to online accounts at financial services

A

Crime-ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

computer enthusiasts that commit cyber crimes by gaining unauthorized access

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ethical hackers that find vulnerabilities in computer systems

A

white hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

un-ethical hackers that test or exploit the vulnerabilities in computer systems

A

black hat hackers

17
Q

they apply loos ethics in their applications of their ability to exploit

A

gray hat hackers

18
Q

they pose the greatest threat to information resources and computer network systems b

A

crackers

19
Q

a less skilled generation of hackers

A

script kiddy

20
Q

a term used to refer to people who break into telecommunications networks to illegally use the provided services

A

phreaker

21
Q

on a window system, when file permissions are controlled though a network connection with the files server this is called a _____ permission

A

shared

22
Q

on a windows system, _____ permissions controls both local and network access

A

NTFS

23
Q

Share and NTFS permissions use a ______ ACL for controlling access

A

discretionary

24
Q

the process of securing devices and software by reducing security exposure and tightening security controls is called

A

hardening

25
Q

a quick fix for a problem, and normally not installed unless you have the specific problem it is intended to fix

A

hotfix

26
Q

a manufacturers quick fix for a problem

A

patch

27
Q

a collection of patches, hotfixes and other system enhancements that have been tested by the manufacturer for wide development

A

service patch

28
Q

a operation system that comes hardened and validated to a specific security level is called

A

trusted operating system (TOS)

29
Q

when a attacker tries every known combination

A

brute force attack

30
Q

this is attack is an attack on a key containing a small data set

A

mathematical attack

31
Q

this attack focuses on hashing

A

birthday attack