• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back

armored virus

virus that is obfuscated to make it difficult to reverse engineer

logic bomb

executes in response to event

worm

self replicating malware, negatively affects network performance

polymorphic malware

malware that changes itself slightly on each iteration so that AV software cannot easily detect it

botnet

network of bots, often used for malicious purposes

rootkits

have system level access and can modify system files and system access

spear phishing

phishing that attacks specific target or group

spim

spam with instant messanging

vishing

phishing with VoIP

heuristic based detection

detection of malware with unknown signature by observing behavior

most effective protection against adware

pop up blockers

drive by

used to infect system with trojan