- Shuffle
Toggle On
Toggle Off
- Alphabetize
Toggle On
Toggle Off
- Front First
Toggle On
Toggle Off
- Both Sides
Toggle On
Toggle Off
- Read
Toggle On
Toggle Off
Card Range To Study
through
Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
- Share
- Export
- Clone
10 Cards in this Set
- Front
- Back
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as: | A Macro | |
In the ______ ______________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host. | Split Infection | |
What type of malware is heavily dependent on a user in order to spread? | Viruses | |
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as: | Ransomware | |
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm. | Malware | |
The two types of malware that require user intervention to spread are: | Viruses and Worms | |
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system. | True | |
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique? | Swiss Cheese | |
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information. | True | |
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals? | Social engineering |
Two types of malware have the primary trait of circulation. These are viruses and worms.
A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.
A rootkit can hide its presence, but not the presence of other malware.
Vishing is a false warning, often contained in an email message claiming to come from the IT department.
What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
Which of the following is malicious computer code that reproduces itself on the same computer?
What type of malware is heavily dependent on a user in order to spread?
A virus that infects an executable program file is known as?
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
Select below the type of malware that appears to have a legitimate use, but contains something malicious:
What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
What type of system security malware allows for access to a computer, program, or service without authorization?
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's device?
Which of the following are considered to be the primary payload capabilities found in malware? (Choose all that apply.)
Launch attacks
Delete data
Collect data
What type of malicious software technology is used to download and install software without the user's interaction?
Automatic download software
What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information?
What type of software can be installed in an individual's web browser to prevent ads from displaying?
What type of structure is used to provide instructions to infected bot computers?
What specific science discipline do most social engineering attacks rely on when they are being used?
What social engineering principal convinces a victim an immediate action is needed?
Which type of phishing attack targets specific users?