• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Two types of malware have the primary trait of circulation. These are viruses and worms.

True

A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.

True

A rootkit can hide its presence, but not the presence of other malware.

False

Vishing is a false warning, often contained in an email message claiming to come from the IT department.

False

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?

Social Engineering

Which of the following is malicious computer code that reproduces itself on the same computer?

Virus

What type of malware is heavily dependent on a user in order to spread?

Virus

A virus that infects an executable program file is known as?

Program virus

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

A macro

Select below the type of malware that appears to have a legitimate use, but contains something malicious:

Trojan

What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?

Logic bomb

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?

Easter egg

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

Adware

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?

Watering hole

What type of system security malware allows for access to a computer, program, or service without authorization?

Backdoor

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

Ransomware

What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's device?

Crypto-malware

Which of the following are considered to be the primary payload capabilities found in malware? (Choose all that apply.)

Launch attacks



Delete data



Collect data

What type of malicious software technology is used to download and install software without the user's interaction?

Automatic download software

What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information?

Tracking software

What type of software can be installed in an individual's web browser to prevent ads from displaying?

Ad blocking

What type of structure is used to provide instructions to infected bot computers?

Command & control

What specific science discipline do most social engineering attacks rely on when they are being used?

Psychology

What social engineering principal convinces a victim an immediate action is needed?

Urgency

Which type of phishing attack targets specific users?

Spear phishing