Types Of Malware Reviewer Flashcards

1
Q

a piece of code that spreads from one computer to another by attaching itself to other files.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

that spreads from one computer to another on its own, not by attaching itself to another file like a virus.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an insidious type of malware that is itself a software attack and paves the way for a number of other types of attacks.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

that sits dormant on a target computer until it is triggered by a specific event, such as a specific date

A

Logic Bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data collected can include web browsing history, personal information, banking and other financial information, as well as usernames and passwords.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

software that automatically displays or downloads advertisements when it is used. Also, it can reduce user productivity by slowing down the systems and simply by creating annoyances.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

often attempt to hide themselves from monitoring or detection and modify low-level system files when integrating themselves into a system

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the messages can quickly fill a user’s inbox and cause storage issues; it can also carry malicious code and other types of malware.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is an IM internet messaging-based attack similar to spam that propagated through IM instead of through mail.

A

Spim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It usually displays a message stating that you must pay a fee or face some other penalty before you can access your files and computer again.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

who are known to possess a good deal of wealth. It is also known as spear phishing.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the attacker sends an email that seems to come from a respected bank or other financial institution.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system and IP-based voice messaging services (VOIP) as the communication medium.

A

Vishing / Voice Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is intended to trick the user into performing undesirable actions, such as deleting important system files in an attempt to remove a virus. It could also be a scam to convince users to give up important information or money for an interesting offer.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The goal is to pretend to be someone else for the purpose of identity concealment. Can occur IP addresses, MAC addresses, and email.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

where an attacker pretends to be someone he/she is not

A

Impersonation