What term below is used to describe a means of gathering information for an attack

Card Range To Study

through

What term below is used to describe a means of gathering information for an attack

What term below is used to describe a means of gathering information for an attack

What term below is used to describe a means of gathering information for an attack

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

  • Share
  • Print
  • Export
  • Clone

10 Cards in this Set

  • Front
  • Back

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

A Macro

In the ______ ______________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.

Split Infection

What type of malware is heavily dependent on a user in order to spread?

Viruses

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

Ransomware

Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.

Malware

The two types of malware that require user intervention to spread are:

Viruses and Worms

Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.

True

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

Swiss Cheese

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

True

What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?

Social engineering

Two types of malware have the primary trait of circulation. These are viruses and worms.

A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.

A rootkit can hide its presence, but not the presence of other malware.

Vishing is a false warning, often contained in an email message claiming to come from the IT department.

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?

Which of the following is malicious computer code that reproduces itself on the same computer?

What type of malware is heavily dependent on a user in order to spread?

A virus that infects an executable program file is known as?

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

Select below the type of malware that appears to have a legitimate use, but contains something malicious:

What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?

What type of system security malware allows for access to a computer, program, or service without authorization?

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's device?

Which of the following are considered to be the primary payload capabilities found in malware? (Choose all that apply.)

Launch attacks


Delete data


Collect data

What type of malicious software technology is used to download and install software without the user's interaction?

Automatic download software

What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information?

What type of software can be installed in an individual's web browser to prevent ads from displaying?

What type of structure is used to provide instructions to infected bot computers?

What specific science discipline do most social engineering attacks rely on when they are being used?

What social engineering principal convinces a victim an immediate action is needed?

Which type of phishing attack targets specific users?

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individual?

Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables.

What is the term for computer programs that attack your computer?

As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.

What is the term used for a group of computers controlled by an attacker and used for sending spam emails or instigating a denial of service attack?

The term botnet is a portmanteau from the words robot and network and each infected device is called a bot. Botnets can be designed to accomplish illegal or malicious tasks including sending spam, stealing data, ransomware, fraudulently clicking on ads or distributed denial-of-service (DDoS) attacks.

Is a term that refers to an attack whereby all the files and folders on a computer system are encrypted and held until the computer owner pays money for their release?

Ransomware is a subset of malware in which the data on a victim's computer is locked -- typically by encryption -- and payment is demanded before the ransomed data is decrypted and access is returned to the victim.