Chapter 2
True
A macro is a series of instructions that can be grouped together as a single command.
trust
A macro virus takes advantage of the "________" relationship between the application and the operating system.
spear phishing
A phishing attack that targets only specific users
A macro
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
program virus
A virus that infects an executable program file is known as?
True
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
logic bomb
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?
70
How many different Microsoft Windows file types can be infected with a virus?
split infection
In the ________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
malware
Malicious software, or ________, silently infiltrate computers with the intent to do harm.
Ransomware
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
Oligomorphic malware
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?
Swiss cheese
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
Trojan
Select the type of malware that appears to have a legitimate use, but actually contains or does something malicious.
True
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
False
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
False
Successful attacks on computers today consist of a single element, malicious software programs that are created to infiltrate computers with the intent to do harm.
Tailgating
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?
Viruses and trojans
The two types of malware that require user intervention to spread are:
virus
What is malicious computer code that reproduces itself on the same computer?
Spim
What is the term used to describe unsolicited messages received on instant messaging software?
Adware
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
Social engineering
What term is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
Watering Hole
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
rootkit
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
Virus
What type of malware is heavily dependent on a user in order to spread?
Backdoor
What type of system security malware allows for access to a computer, program, or service without authorization?
Easter egg
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
Source
Which is not one of the four methods for classifying the various types of malware?
spyware
________ is a general term used to describe software that secretly spies on users by collecting information without their consent.
keylogger
A ________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
hoax
A false warning designed to trick users into changing security settings on their computer
botnet
A logical computer network of zombies under the control of an attacker.