• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
What type of system security malware allows for access to a computer, program, or service without authorization?
Backdoor
A macro virus takes advantage of the “____________________” relationship between the application and the operating system.
Trust
What is the term used to describe unsolicited messages received on instant messaging software?
Spim
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
False
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
Adware
A virus that infects an executable program file is known as?
Program
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
Watering Hole
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
Easter Egg
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
Rootkit
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?
Oligormorphic malware