Ch. 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

A macro

Describe how a rootkit works. How is this different from a typical virus or malware?

A rootkit hangs out on the lower levels of the operating system where it can do its dirty work and remain untraceable. Typical malware operates on the upper levels and is more likely to be detected.

Delivers advertising content in a manner that is unexpected and unwanted by the user.

Adware

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?

Easter egg

Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action.

Malware

A means of gathering information for an attack by relying on the weaknesses of individuals.

Social engineering

A type of malware that appears to have a legitimate use, but contains something malicious.

Trojan

A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols. (True or false)

True

Malicious computer code that reproduces itself on the same computer without any human intervention.

Virus

A malicious attack that is directed toward a smaller group of specific individuals by embedding malware in a website frequented by these individuals.

Watering hole attack

A type of spear phishing that goes after big targets, namely, wealthy individuals or senior executives within a business who typically would have larger sums of money in a bank account that an attacker could access if the attack is successful.

Whaling

A malicious program that uses a computer network to replicate.

Worm

This gives access to a computer, program, or service by circumventing any normal security protections.

backdoor

Ransomware that encrypts all the files on a device so that none of them can be opened.

crypto-malware

A virus self-replicates on the host computer and spreads to other computers by itself. (True or false)

false

What social engineering principal frightens and coerces a victim by using threats?

intimidation

What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

keylogger

What type of computer code is typically added to a legitimate program but lies dormant until a specific event triggers it?

logic bomb

Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

phishing

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

ransomware

Which type of phishing attack targets specific users?

spear phishing

Tracking software that is deployed without the consent or control of the user.

spyware

Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. (True or false)

true

Social engineering impersonation means to masquerade as a real or fictitious character and then play out the role of that person on a victim. (True or false)

true

What social engineering principal convinces a victim an immediate action is needed?

urgency

What specific type of phishing attack uses the telephone to target a victim?

vishing


संबंधित स्टडी सेट्स

True or False Questions from Lectures

View Set

[PEDIATRIC] Chapter 16, Nursing Care of Child With an Alteration in Intercranial Regulation/Neurologic Disorder

View Set

Week 8: Communication and Managing Conflict

View Set

Chapter 16 Organizational Structure and Design

View Set

Analytics - Chapter 11 - Time Series Forecasting

View Set

Honan Nursing Management Patients with Hypertension Ch 12

View Set