Threats Attacks Vulnerabilities Flashcards

1
Q

Unsolicited and unwanted malicious program

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A malicious program that encrypts programs and files on the computer in order to extort money from the user.

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Denies access to a computer system or data until a ransom is paid. Can be spread through a phishing email or unknowingly infected website.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A self-contained infection that can spread itself through networks, emails, and messages.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A form of malware that pretends to be a harmless application.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A backdoor program that allows full remote access to a system.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A malicious program that saves all of the keystrokes of the infected machine.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A program that produces ads and pop ups using your browser, may replace the original browser and produce fake ads to remove the adware in order to download more malware.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software that installs itself to spy on the infected machine, sends the stolen information over the internet back to the host machine.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AI that when inside an infected machine performs specific actions as part of a larger entity known as a botnet.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A remotely operated Trojan

A

Remote Access Trojan
RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious program that lies dormant until a specific date or event occurs.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Allows for full access to a system remotely.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly