Which of the following is malicious computer code that reproduces itself on the same computer?

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Social Science
  2. Sociology

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Malware and Social Engineering Attacks

Terms in this set (25)

Spreading similarly to a virus, a worm inserts malicious code into a program or data file.

True or False?

Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.

True or False?

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

True or False

Successful attacks on computers today consist of a single element, malicious software programs that are created to infiltrate computers with the intent to do harm.

True or False?

A macro is a series of instructions that can be grouped together as a single command.

True or False?

What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?

Phreaking
Hacking
Social engineering
Reverse engineering

The two types of malware that require user intervention to spread are:

Viruses and Trojans
Rootkits and worms
Trojans and worms
Rootkits and Trojans

Which of the following is malicious computer code that reproduces itself on the same computer?

virus
worm
adware
spyware

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect. In addition, it separates virus code into different pieces, and injects these pieces throughout the infected program code. What is the name for this technique?

stealth
appender
Swiss cheese
split

What type of malware is heavily dependent on a user in order to spread?

Trojan
worm
rootkit
virus

A virus that infects an executable program file is known as?

macro virus
program virus
companion virus
boot sector virus

How many different Microsoft Windows file types can be infected with a virus?

50
60
70
80

A series of instructions that can be grouped together as a single command, and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

a rootkit
a macro
a program
a process

Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:

script
virus
Trojan
worm

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

rootkit
backdoor
wrapper
shield

Computer code that is typically added to a legitimate program, but lies dormant until it is triggered by a specific logical event is known as a?

Trojan
logic bomb
macro virus
metamorphic virus

What type of undocumented, yet benign, hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?

Trojan horse
virus
bug
Easter egg

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

Adware
Keylogger
Spam
Trojan

What is the term used to describe unsolicited messages received on instant messaging software?

Spam
Spim
Splat
Crust

Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?

Oligomorphic malware
Polymorphic malware
Metamorphic malware
Statimorphic malware

Which of the following is not one of the four methods for classifying the various types of malware?

Circulation
Infection
Concealment
Source

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?

Spam
Adware
Watering Hole
Typo Squatting

The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?

Dumpster diving
Tailgating
Stalking
Shadowing

What type of system security malware allows for access to a computer, program, or service without authorization?

Botnet
Zombie
Backdoor
Command and Control

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

Lockware
Ransomware
Stealware
Hostageware

Sets with similar terms

Security.5e.Chapter.2.Quiz

20 terms

israel_vargas

Information Security Chapter 2

20 terms

leeeesuh

ITN_260 Chapter 2

19 terms

sylvia_johnsonPLUS

cyber quiz 2

50 terms

alexis_gildersleeve6

Sets found in the same folder

Chapter 8 Quiz

40 terms

Casey_Scott305

Fundamentals of Network Security Chapter 5

40 terms

Ni_Tha

security chapter 5

30 terms

L_Stever

Chapter 2

24 terms

Emily_Summerlin7

Other sets by this creator

Chess boi

12 terms

ITGuy99

Terms to learn

109 terms

ITGuy99

Stuff To Learn From BVASD

11 terms

ITGuy99

FBM PLAID

6 terms

ITGuy99

Verified questions

SOCIOLOGY

In a supervisor system, a board of supervisors is responsible for governing the county, overseeing departments, and creating policies. governing the county, with little power to create policies. governing the county with a council and an executive. governing the county, creating policies, and supervising a council.

Verified answer

SOCIOLOGY

Negative thoughts that occur while driving often surface in the form of __________. playing loud music hostile verbal expression a cheery, upbeat attitude getting lost during your trip

Verified answer

SOCIOLOGY

Identify the following actions as desocialization (D), resocialization (R), or anticipatory socialization (A). a. First-year students acquire a new identity during their freshman year at a military academy. b. Prison personnel deliberately attempt to destroy the self-concepts of inmates. c. High school students identify with college students

Verified answer

SOCIOLOGY

Many people appear to be less interested in religion during their teenage years. This might be seen in falling church attendance for this age group. Using your sociological imagination, suggest some reasons for this apparent lack of interest. Consider developmental (age) and social factors. Defending on your answers what suggestions might you make to religious organizations looking for ideas on how to keep teenagers involved and active?

Verified answer

Other Quizlet sets

section 10

15 terms

camip090

packaging test- corrugated conatiners

54 terms

CoraBisbee

FMST 301 Rejection, Betrayal, Violence

24 terms

jaclyn_pennington

Lec 11- Theory of mind

18 terms

karli_pirro

Related questions

QUESTION

Data in a sports club database has been deleted without authorisation.Identify the type of cyber security incident which has occurred. (1 mark)

2 answers

QUESTION

Explain how an individual can protect their computer from phishing scams.

5 answers

QUESTION

14. Which command would retrieve banner information from a website at port 80?

9 answers

QUESTION

MLA Heading, running header starting on first page of paper, cover page (student name, christian service final paper, class of 2020, name of placement)

2 answers

What is a malicious computer code that reproduces itself on the same computer?

keylogger. A phishing attack that targets only specific users. spear fishing. Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.​

Which of the following is malicious computer code that reproduces itself on the same computer a virus B worm C spyware D adware?

A computer virus (virus) is malicious computer code that, like its biological counterpart, reproduces itself on the same computer.

Which of the following is malicious computer program code?

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.

What type of system security malware allows for access to a computer program or service without authorization?

A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected computer system that enables threat actors to remotely access it without alerting the user or the system's security programs.