Show
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Malware and Social Engineering Attacks Terms in this set (25)Spreading similarly to a virus, a worm inserts malicious code into a program or data file. True or False? Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system. True or False? Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information. True or False Successful attacks on computers today consist of a single element, malicious software programs that are created to infiltrate computers with the intent to do harm. True or False? A macro is a series of instructions that can be grouped together as a single command. True or False? What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals? Phreaking The two types of malware that require user intervention to spread are: Viruses and Trojans Which of the following is malicious computer code that reproduces itself on the same computer? virus One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect. In addition, it separates virus code into different pieces, and injects these pieces throughout the infected program code. What is the name for this technique? stealth What type of malware is heavily dependent on a user in order to spread? Trojan A virus that infects an executable program file is known as? macro virus How many different Microsoft Windows file types can be infected with a virus? 50 A series of instructions that can be grouped together as a single command, and are often used to automate a complex set of tasks or a repeated series of tasks are known as: a rootkit Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious: script What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms? rootkit Computer code that is typically added to a legitimate program, but lies dormant until it is triggered by a specific logical event is known as a? Trojan What type of undocumented, yet benign, hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative? Trojan horse What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware? Adware What is the term used to describe unsolicited messages received on instant messaging software? Spam Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed? Oligomorphic malware Which of the following is not one of the four methods for classifying the various types of malware? Circulation What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company? Spam The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as? Dumpster diving What type of system security malware allows for access to a computer, program, or service without authorization? Botnet Malware that locks or prevents a device from functioning properly until a fee has been paid is known as: Lockware Sets with similar termsSecurity.5e.Chapter.2.Quiz20 terms israel_vargas Information Security Chapter 220 terms leeeesuh ITN_260 Chapter 219 terms sylvia_johnsonPLUS cyber quiz 250 terms alexis_gildersleeve6 Sets found in the same folderChapter 8 Quiz40 terms Casey_Scott305 Fundamentals of Network Security Chapter 540 terms Ni_Tha security chapter 530 terms L_Stever Chapter 224 terms Emily_Summerlin7 Other sets by this creatorChess boi12 terms ITGuy99 Terms to learn109 terms ITGuy99 Stuff To Learn From BVASD11 terms ITGuy99 FBM PLAID6 terms ITGuy99 Verified questions
SOCIOLOGY In a supervisor system, a board of supervisors is responsible for governing the county, overseeing departments, and creating policies. governing the county, with little power to create policies. governing the county with a council and an executive. governing the county, creating policies, and supervising a council. Verified answer
SOCIOLOGY Negative thoughts that occur while driving often surface in the form of __________. playing loud music hostile verbal expression a cheery, upbeat attitude getting lost during your trip Verified answer
SOCIOLOGY Identify the following actions as desocialization (D), resocialization (R), or anticipatory socialization (A). a. First-year students acquire a new identity during their freshman year at a military academy. b. Prison personnel deliberately attempt to destroy the self-concepts of inmates. c. High school students identify with college students Verified answer
SOCIOLOGY Many people appear to be less interested in religion during their teenage years. This might be seen in falling church attendance for this age group. Using your sociological imagination, suggest some reasons for this apparent lack of interest. Consider developmental (age) and social factors. Defending on your answers what suggestions might you make to religious organizations looking for ideas on how to keep teenagers involved and active? Verified answer Other Quizlet setssection 1015 terms camip090 packaging test- corrugated conatiners54 terms CoraBisbee FMST 301 Rejection, Betrayal, Violence24 terms jaclyn_pennington Lec 11- Theory of mind18 terms karli_pirro Related questionsQUESTION Data in a sports club database has been deleted without authorisation.Identify the type of cyber security incident which has occurred. (1 mark) 2 answers QUESTION Explain how an individual can protect their computer from phishing scams. 5 answers QUESTION 14. Which command would retrieve banner information from a website at port 80? 9 answers QUESTION MLA Heading, running header starting on first page of paper, cover page (student name, christian service final paper, class of 2020, name of placement) 2 answers What is a malicious computer code that reproduces itself on the same computer?keylogger. A phishing attack that targets only specific users. spear fishing. Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.
Which of the following is malicious computer code that reproduces itself on the same computer a virus B worm C spyware D adware?A computer virus (virus) is malicious computer code that, like its biological counterpart, reproduces itself on the same computer.
Which of the following is malicious computer program code?Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.
What type of system security malware allows for access to a computer program or service without authorization?A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected computer system that enables threat actors to remotely access it without alerting the user or the system's security programs.
|