• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back

that is written in a script known as a marco

macro virus

a virus that infects an executable program file is simply

program virus

is malicious computer code that, like its biological counterpart, reproduces itself on the same computer.

computer virus (virus)

is an agent that reproduces inside a cell

biological virus

can actually rewrite its own code and thus appears different each time it is executed.

Metamorphic malware

malware code that completely changes from its original form whenever it is executed is known as

Polymorphic malware

changes its internal code to one of a set number of predefined mutations whenever it is executed

Oligomorphic malware

is software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful actions

Malware

series of instructions that can be grouped together as a single command.

Macro

malicious program that uses a computer network to replicate (worms are sometimes called network viruses)

Worm

an executable program that masquerades as performing a benign activity but also does something malicious

Trojan Horse (Trojan)

delivers advertising content in a manner that is unexpected and unwanted by the user

Adware

that silently captures and stores each keystoke that user types on the computer's keyboard

Keylogger

a general term used to describe software that secretly spies on users by collecting information without their consent

Spyware

prevents a user's device from properly operating until a fee is paid.

Ransomware

infected robot (bot) computer is known as a

zombie

infected zombie computers wait for instructions through a

command and control (C&C or C) structure from the bot herders regarding which computers to attack and how.

gives access to a computer, program, or service that circumvents any normal security protections.

backdoor

means to masquerade as a real or ficticious character and then play out the role of that person on a victim

impersonation

sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

phising

one type of spear phishing

whaling

an attacker calls a victim who., upon answering, hears a recorded message that pretends to be from the user's bank stating that her credit card has experienced fraudelent activity or that her bank account has had unusual activity

vishing (voice phising)

one type of spear phising is

whaling

emails that are used to target specific recipients

spear phising

unsolicited email, that goes through the internet continues to escalate

Spam

directed toward a smaller group of specific individuals, such as the major executives working for a manufactuing company

watering hole attack

involves digging though trash receptacles to find information that can be useful in an attack

Dumpster diving

a false warning often contained in an email message claiming to come from the IT department

Hoax

fake sites exist because attackers purchase the domain names of sites that are spelled similary to actual sites.

typo squatting/ URL hijacking

when an attacker cannot enter a building as a tailgater without raising suspicion, an alternative is to watch an individual entering the security code on a keypad and is known as

Shoulder surfing

people who enter the building when access is allowed, once an authorized person opens the door, virtually any number of individuals can follow behind and also enter is known as

Tailgating

The preferred method of bot herders for command and control of zombies is

Hypertext Transport Protocol (HTTP)

A watering hole attack is directed agaisnt

users who access a common website

which of these is a general term used for describing software that gathers information without the user's consent

spyware

what is it called when a user makes a typing error when entering a URL that takes him to an imposter website

Typo squatting

which of these could NOT be defined as a logic bomb?

send spam email to all users in the company on Tuesday

which statement is regarding a keylogger is NOT true?

software keyloggers are easy to detect

a user who installs a program that prints out coupons but in the background silently collects her passwords has installed a

trojan

what should you do to completely remove a rootkit from a computer

reformat the hard drive and reinstall the operating system.

which of the following is an attempt to influence a user by coercion?

intimidation

which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency

ransomware

which of these is NOT an action that a virus can take?

transport itself through the network to another device.

a ________ requires a user to transport it from one computer to another

virus

what is the term used for an attacker who controls multiple zombies in a botnet

bot herder

each of these is a reason why adware is scorned EXCEPT

it displays the attacker's programming skills

_______ is following an authorized person through a secure door

Tailgating

which of these items retrieved through dumpster diving would NOT provide useful information?

books

Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed?

impersonation

What is unsolicited instant messaging called?

spim

________ sends phising messages only to wealthy individuals

Whaling

A watering hole attack is directed against ______

users who access a common website