Types Of Malware Flashcards

0
Q

Worms

A

Similar to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging systems as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Viruses

A

A computer virus is a program that makes copies of itself, attaches itself to program’s you have installed on your computer and then damages your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer. It then carries out its real task, for example displaying adverts on the desktops or installing unwanted toolbars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

R.A.T

A

A remote access Trojan gives control of your computer to a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rootkits

A

Software that allows a hacker to get control of your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Diallers

A

A malicious program that takes control of your computer and uses it to call expensive phone numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scareware

A

Scareware is a false security software that tries to scare the user into buying it by warning the user of some threat to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keyloggers

A

A keylogger is a program designed to track and monitor the user keystrokes, often used to steal passwords, credit card details etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Spyware program’s gather information about you from your computer. This can be personal information or information about which websites you have visited. Some spyware can also change your computer settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adware

A

Adware displays unwanted ads on your computer without asking your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Browser Exploits

A

A malicious code that takes advantage of an Internet browser vulnerability to make the browser do something you don’t want it to do. (Freeze, Crash, Change settings etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operating System Exploits

A

A malicious code that takes advantage of a weakness in your operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

P2P infections

A

Infected files that come from file share websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

Phishing is an attempt to get your personal information such as your
bank account details by pretending to be, for example, a charity or claiming that you have won a cash prize. It’s often carried out by email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Theft

A

When people steal your personal details and pretend to be you for example, shopping online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacking

A

When someone accesses a computer system by finding a way around security.

16
Q

D.O.S attack

A

D.o.S attacks are an attempt to make a computer or network resource unavailable to its intended users.