Malware (Computing homework) Flashcards

I'ts homework.

1
Q

Viruses

A

A computer virus is aprogram that makes copies of itself to programs you have installed on your computer and then damages your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for example, displaying adverts on the desktop or installing unwanted toolbars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

Aremote access trojan which gives control of your computer to the hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkits

A

The software that enables a hacker to get control of your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Diallers

A

A malicious program designed to track and moniter the users keystrokes, often used to steal passwords, credit cards, details, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Spyware programs gather information about you from your computer. This can be personal information or information about what websites you have visted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

Adware Adware displays unwanted adverts on your computer without asking permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Browser exploits

A

A maliciouse code that t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAT

A

Aremote access trojan which gives control of your computer to the hacker.

17
Q

Rootkits

A

The software that enables a hacker to get control of your computer.

18
Q

Diallers

A

A malicious program designed to track and moniter the users keystrokes, often used to steal passwords, credit cards, details, etc…

19
Q

Spyware

A

Spyware programs gather information about you from your computer. This can be personal information or information about what websites you have visted.

20
Q

Adware

A

Adware Adware displays unwanted adverts on your computer without asking permission.

21
Q

Browser exploits

A

A malicious code that takes advantage of an internet browser vulnerability to make the browser do something you don’t want.

22
Q

Operating systems exploits

A

A malicious code that takes advantage of a weakness in your operating system.

23
Q

P2P Infection

A

Infected files which come from a file sharing website.

24
Q

Phishing

A

Phishing is an attempt to get your personal information such as your bank account details by pretending to be, for example, a charity or claiming that you have won a cash prize. Its often carried out by email.

25
Q

Identity theft

A

When people steal your personal details and pretend to be you, for example, buying online.

26
Q

Hacking

A

When someone acceses a computer system by finding a way around security.

27
Q

Denial of service attack

A

DoS attacks are an attempt to make a computer or network resource unavailable to it’s intended users.