Ch. 2
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
A macro
Describe how a rootkit works. How is this different from a typical virus or malware?
A rootkit hangs out on the lower levels of the operating system where it can do its dirty work and remain untraceable. Typical malware operates on the upper levels and is more likely to be detected.
Delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?
Easter egg
Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action.
Malware
A means of gathering information for an attack by relying on the weaknesses of individuals.
Social engineering
A type of malware that appears to have a legitimate use, but contains something malicious.
Trojan
A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols. (True or false)
True
Malicious computer code that reproduces itself on the same computer without any human intervention.
Virus
A malicious attack that is directed toward a smaller group of specific individuals by embedding malware in a website frequented by these individuals.
Watering hole attack
A type of spear phishing that goes after big targets, namely, wealthy individuals or senior executives within a business who typically would have larger sums of money in a bank account that an attacker could access if the attack is successful.
Whaling
A malicious program that uses a computer network to replicate.
Worm
This gives access to a computer, program, or service by circumventing any normal security protections.
backdoor
Ransomware that encrypts all the files on a device so that none of them can be opened.
crypto-malware
A virus self-replicates on the host computer and spreads to other computers by itself. (True or false)
false
What social engineering principal frightens and coerces a victim by using threats?
intimidation
What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?
keylogger
What type of computer code is typically added to a legitimate program but lies dormant until a specific event triggers it?
logic bomb
Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
phishing
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
ransomware
Which type of phishing attack targets specific users?
spear phishing
Tracking software that is deployed without the consent or control of the user.
spyware
Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. (True or false)
true
Social engineering impersonation means to masquerade as a real or fictitious character and then play out the role of that person on a victim. (True or false)
true
What social engineering principal convinces a victim an immediate action is needed?
urgency
What specific type of phishing attack uses the telephone to target a victim?
vishing