Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
51 Cards in this Set
- Front
- Back
that is written in a script known as a marco |
macro virus |
|
a virus that infects an executable program file is simply |
program virus |
|
is malicious computer code that, like its biological counterpart, reproduces itself on the same computer. |
computer virus (virus) |
|
is an agent that reproduces inside a cell |
biological virus |
|
can actually rewrite its own code and thus appears different each time it is executed. |
Metamorphic malware |
|
malware code that completely changes from its original form whenever it is executed is known as |
Polymorphic malware |
|
changes its internal code to one of a set number of predefined mutations whenever it is executed |
Oligomorphic malware |
|
is software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful actions |
Malware |
|
series of instructions that can be grouped together as a single command. |
Macro |
|
malicious program that uses a computer network to replicate (worms are sometimes called network viruses) |
Worm |
|
an executable program that masquerades as performing a benign activity but also does something malicious |
Trojan Horse (Trojan) |
|
delivers advertising content in a manner that is unexpected and unwanted by the user |
Adware |
|
that silently captures and stores each keystoke that user types on the computer's keyboard |
Keylogger |
|
a general term used to describe software that secretly spies on users by collecting information without their consent |
Spyware |
|
prevents a user's device from properly operating until a fee is paid. |
Ransomware |
|
infected robot (bot) computer is known as a |
zombie |
|
infected zombie computers wait for instructions through a |
command and control (C&C or C) structure from the bot herders regarding which computers to attack and how. |
|
gives access to a computer, program, or service that circumvents any normal security protections. |
backdoor |
|
means to masquerade as a real or ficticious character and then play out the role of that person on a victim |
impersonation |
|
sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. |
phising |
|
one type of spear phishing |
whaling |
|
an attacker calls a victim who., upon answering, hears a recorded message that pretends to be from the user's bank stating that her credit card has experienced fraudelent activity or that her bank account has had unusual activity |
vishing (voice phising) |
|
one type of spear phising is |
whaling |
|
emails that are used to target specific recipients |
spear phising |
|
unsolicited email, that goes through the internet continues to escalate |
Spam |
|
directed toward a smaller group of specific individuals, such as the major executives working for a manufactuing company |
watering hole attack |
|
involves digging though trash receptacles to find information that can be useful in an attack |
Dumpster diving |
|
a false warning often contained in an email message claiming to come from the IT department |
Hoax |
|
fake sites exist because attackers purchase the domain names of sites that are spelled similary to actual sites. |
typo squatting/ URL hijacking |
|
when an attacker cannot enter a building as a tailgater without raising suspicion, an alternative is to watch an individual entering the security code on a keypad and is known as |
Shoulder surfing |
|
people who enter the building when access is allowed, once an authorized person opens the door, virtually any number of individuals can follow behind and also enter is known as |
Tailgating |
|
The preferred method of bot herders for command and control of zombies is |
Hypertext Transport Protocol (HTTP) |
|
A watering hole attack is directed agaisnt |
users who access a common website |
|
which of these is a general term used for describing software that gathers information without the user's consent |
spyware |
|
what is it called when a user makes a typing error when entering a URL that takes him to an imposter website |
Typo squatting |
|
which of these could NOT be defined as a logic bomb? |
send spam email to all users in the company on Tuesday |
|
which statement is regarding a keylogger is NOT true? |
software keyloggers are easy to detect |
|
a user who installs a program that prints out coupons but in the background silently collects her passwords has installed a |
trojan |
|
what should you do to completely remove a rootkit from a computer |
reformat the hard drive and reinstall the operating system. |
|
which of the following is an attempt to influence a user by coercion? |
intimidation |
|
which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency |
ransomware |
|
which of these is NOT an action that a virus can take? |
transport itself through the network to another device. |
|
a ________ requires a user to transport it from one computer to another |
virus |
|
what is the term used for an attacker who controls multiple zombies in a botnet |
bot herder |
|
each of these is a reason why adware is scorned EXCEPT |
it displays the attacker's programming skills |
|
_______ is following an authorized person through a secure door |
Tailgating |
|
which of these items retrieved through dumpster diving would NOT provide useful information? |
books |
|
Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed? |
impersonation |
|
What is unsolicited instant messaging called? |
spim |
|
________ sends phising messages only to wealthy individuals |
Whaling |
|
A watering hole attack is directed against ______ |
users who access a common website |