Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
- Social Science
- Sociology
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Malware and Social Engineering Attacks
Terms in this set (25)
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
True or False?
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
True or False?
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
True or False
Successful attacks on computers today consist of a single element, malicious software programs that are created to infiltrate computers with the intent to do harm.
True or False?
A macro is a series of instructions that can be grouped together as a single command.
True or False?
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
Phreaking
Hacking
Social engineering
Reverse engineering
The two types of malware that require user intervention to spread are:
Viruses and Trojans
Rootkits and worms
Trojans and worms
Rootkits and Trojans
Which of the following is malicious computer code that reproduces itself on the same computer?
virus
worm
adware
spyware
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect. In addition, it separates virus code into different pieces, and injects these pieces throughout the infected program code. What is the name for this technique?
stealth
appender
Swiss
cheese
split
What type of malware is heavily dependent on a user in order to spread?
Trojan
worm
rootkit
virus
A virus that infects an executable program file is known as?
macro virus
program virus
companion virus
boot sector virus
How many different Microsoft Windows file types can be infected with a virus?
50
60
70
80
A series of instructions that can be grouped together as a single command, and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
a rootkit
a macro
a program
a process
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:
script
virus
Trojan
worm
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
rootkit
backdoor
wrapper
shield
Computer code that is typically added to a legitimate program, but lies dormant until it is triggered by a specific logical event is known as a?
Trojan
logic bomb
macro virus
metamorphic virus
What type of undocumented, yet benign, hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
Trojan horse
virus
bug
Easter egg
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
Adware
Keylogger
Spam
Trojan
What is the term used to describe unsolicited messages received on instant messaging software?
Spam
Spim
Splat
Crust
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?
Oligomorphic malware
Polymorphic malware
Metamorphic malware
Statimorphic
malware
Which of the following is not one of the four methods for classifying the various types of malware?
Circulation
Infection
Concealment
Source
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
Spam
Adware
Watering
Hole
Typo Squatting
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?
Dumpster diving
Tailgating
Stalking
Shadowing
What type of system security malware allows for access to a computer, program, or service without authorization?
Botnet
Zombie
Backdoor
Command
and Control
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
Lockware
Ransomware
Stealware
Hostageware
Security.5e.Chapter.2.Quiz
20 terms
israel_vargas
Information Security Chapter 2
20 terms
leeeesuh
ITN_260 Chapter 2
19 terms
sylvia_johnsonPLUS
cyber quiz 2
50 terms
alexis_gildersleeve6
Sets found in the same folderChapter 8 Quiz
40 terms
Casey_Scott305
Fundamentals of Network Security Chapter 5
40 terms
Ni_Tha
security chapter 5
30 terms
L_Stever
Chapter 2
24 terms
Emily_Summerlin7
Other sets by this creatorChess boi
12 terms
ITGuy99
Terms to learn
109 terms
ITGuy99
Stuff To Learn From BVASD
11 terms
ITGuy99
FBM PLAID
6 terms
ITGuy99
Verified questions
SOCIOLOGY
In a supervisor system, a board of supervisors is responsible for governing the county, overseeing departments, and creating policies. governing the county, with little power to create policies. governing the county with a council and an executive. governing the county, creating policies, and supervising a council.
Verified answer
SOCIOLOGY
Negative thoughts that occur while driving often surface in the form of __________. playing loud music hostile verbal expression a cheery, upbeat attitude getting lost during your trip
Verified answer
SOCIOLOGY
Identify the following actions as desocialization (D), resocialization (R), or anticipatory socialization (A). a. First-year students acquire a new identity during their freshman year at a military academy. b. Prison personnel deliberately attempt to destroy the self-concepts of inmates. c. High school students identify with college students
Verified answer
SOCIOLOGY
Many people appear to be less interested in religion during their teenage years. This might be seen in falling church attendance for this age group. Using your sociological imagination, suggest some reasons for this apparent lack of interest. Consider developmental (age) and social factors. Defending on your answers what suggestions might you make to religious organizations looking for ideas on how to keep teenagers involved and active?
Verified answer
Other Quizlet setssection 10
15 terms
camip090
packaging test- corrugated conatiners
54 terms
CoraBisbee
FMST 301 Rejection, Betrayal, Violence
24 terms
jaclyn_pennington
Lec 11- Theory of mind
18 terms
karli_pirro
Related questionsQUESTION
Data in a sports club database has been deleted without authorisation.Identify the type of cyber security incident which has occurred. (1 mark)
2 answers
QUESTION
Explain how an individual can protect their computer from phishing scams.
5 answers
QUESTION
14. Which command would retrieve banner information from a website at port 80?
9 answers
QUESTION
MLA Heading, running header starting on first page of paper, cover page (student name, christian service final paper, class of 2020, name of placement)
2 answers