• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
Which of the following is a self-replicating computer program that uses a network to send copies of itself to other nodes and it may do so without any user intervention so as to damage data or affect system performance?
Worm
The MOST likely reason why many of the workstations on the network are flooding servers is because of:
Worm
Phishing is the criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. The most effective method to avoid a phishing attempt is:
User education
Which of the following is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user’s computer system?
Trojan
Which of the following phrase best describes the statement that an administrator is worried about an attacker using a compromised user account to gain access to a system which normally would have been protected from an application or user?
Privilege escalation
As an administrator, you are assigned to monitor servers in a data center. However, a web server which is connected to the Internet suddenly experiences a large spike in CPU activity. What is most likely the cause of that?
DoS
When is the most appropriate time to update antivirus definitions?
As the definitions become available from the vendor
Refer to the following software threats, which one has the maximum difficulty to detect and hides itself from the operating system?
rootkit
Which of the following does not require periodic updates to maintain accuracy?
pop-up blocker applications
The one that uses a group of bots to prevent a web server from accepting new requests is:
DDoS
Which of the following is a type of malware that is installed on computers and that collects information about users without their knowledge, and reports the contents of the hard drive or the users browsing habits to a remote source?
spyware
While working on a computer, pop-up windows continuously appear on a users screen and states that there is a virus on his computer and would like to offer a program to remove it. As a technician, you doubt about it as the antivirus application is up-to-date. Which of the following option is able to explain that?
SMTP open relay
adware