• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
A Macro
In the ______ ______________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
Split Infection
What type of malware is heavily dependent on a user in order to spread?
Viruses
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
Ransomware
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
Malware
The two types of malware that require user intervention to spread are:
Viruses and Worms
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
True
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
Swiss Cheese
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
True
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
Social engineering