Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Two types of malware have the primary trait of circulation. These are viruses and worms. |
True |
|
A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols. |
True |
|
A rootkit can hide its presence, but not the presence of other malware. |
False |
|
Vishing is a false warning, often contained in an email message claiming to come from the IT department. |
False |
|
What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals? |
Social Engineering |
|
Which of the following is malicious computer code that reproduces itself on the same computer? |
Virus |
|
What type of malware is heavily dependent on a user in order to spread? |
Virus |
|
A virus that infects an executable program file is known as? |
Program virus |
|
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as: |
A macro |
|
Select below the type of malware that appears to have a legitimate use, but contains something malicious: |
Trojan |
|
What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it? |
Logic bomb |
|
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks? |
Easter egg |
|
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware? |
Adware |
|
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company? |
Watering hole |
|
What type of system security malware allows for access to a computer, program, or service without authorization? |
Backdoor |
|
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as: |
Ransomware |
|
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's device? |
Crypto-malware |
|
Which of the following are considered to be the primary payload capabilities found in malware? (Choose all that apply.) |
Launch attacks Delete data Collect data |
|
What type of malicious software technology is used to download and install software without the user's interaction? |
Automatic download software |
|
What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information? |
Tracking software |
|
What type of software can be installed in an individual's web browser to prevent ads from displaying? |
Ad blocking |
|
What type of structure is used to provide instructions to infected bot computers? |
Command & control |
|
What specific science discipline do most social engineering attacks rely on when they are being used? |
Psychology |
|
What social engineering principal convinces a victim an immediate action is needed? |
Urgency |
|
Which type of phishing attack targets specific users? |
Spear phishing |