Study Set Cyber Security 1 Flashcards

1
Q

Adware

A

Adware displays pop-up advertisements to users based on their activities, URLs they have
visited, applications that have accessed, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Viruses get their name from their biological counterparts. They are programs designed to spread
from one system to another through self replication and to perform any of a wide range of malicious
activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Polymorphic virus

A

Polymorphic viruses have the ability to alter their own code in order to avoid detection by
antivirus scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Macro virus

A

Macro viruses live within documents or emails and exploit the scripting capabilities of
productivity software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stealth virus

A

Stealth viruses attempt to avoid detection by masking or hiding their activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Armored virus

A

Armored viruses are designed to be difficult to detect and remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Retroviruse

A

Retroviruses specifically target antivirus systems to render them useless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phage virus

A

Phage viruses modify or infect many aspects of the system so they can be generate themselves
from any remaining on remote parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Companion virus

A

A companion virus borrows the root filename of the common executable and then gives itself
the.com extension in an attempt to get itself launched rather than the intended application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worms

A

A worm is malicious software that travels throughout a network without the assistance of a
host application or user interaction. A worm resides in memory and is able to different transport
protocols to travel over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Spyware is software that is installed on a user’s system without her awareness or consent. Its
purpose is often to take some level of control over the user’s computer to learn information and send
this information to third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan

A

A Trojan horse is a form of malicious software that is disguised as something useful or
legitimate. The goal of a Trojan horse is to trick the user into installing it on the computer. This allows
the malicious code portion of the Trojan horse to gain access to the otherwise secured environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan Fact #1

A

In Greek mythology, the Achaeans try to sack the city of Troy for several years, but they simply
could not succeed. At some point, someone got the idea of building a huge wooden horse and
convincing the people of Troy that it was a gift from the gods. Warriors hid inside, and the horse
was rolled up to the gates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Fact #2

A

The people of Troy party all day and all night, but when the city slept, the Warriors climbed down
from the horse and opened the gates, and the rest of the warriors flooded in. What the Greek
warriors couldn’t do for years, the Trojan horse help them do it in a single day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly