Exam 2: Malware and Social Engineering Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.

(Multiple Choice)
4.9/5
(29)

____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.

(Multiple Choice)
4.9/5
(30)

Explain how an appender infection works.

(Essay)
4.9/5
(37)

____ is when an attacker tricks users into giving out information or performing a compromising action.

(Multiple Choice)
4.9/5
(30)

What is malware?

(Essay)
4.8/5
(28)

____ involves horizontally separating words, although it is still readable by the human eye.

(Multiple Choice)
4.8/5
(40)

What are botnets?

(Essay)
4.9/5
(45)

Unlike other malware, a ____ is heavily dependent upon the user for its survival.

(Multiple Choice)
4.8/5
(26)

The _________________________ contains the program necessary for the computer to start up and a description of how the hard drive is organized (the partition table).

(Short Answer)
4.8/5
(30)

The two types of malware that have the primary objective of spreading are ____.

(Multiple Choice)
4.8/5
(26)

Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.

(Short Answer)
4.8/5
(27)

A ____ is a program advertised as performing one activity but actually does something else.

(Multiple Choice)
4.8/5
(39)

In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.

(Short Answer)
4.9/5
(35)

A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.

(Short Answer)
4.8/5
(40)

In a(n) ____ infection, a virus injects itself into the program's executable code instead of at the end of the file.

(Multiple Choice)
4.8/5
(40)

What is a worm?

(Essay)
4.8/5
(46)

What is a backdoor and what is it used for?

(Essay)
4.9/5
(32)

Removing a rootkit from an infected computer is extremely difficult.

(True/False)
4.8/5
(39)

____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

(Multiple Choice)
4.7/5
(30)

Viruses and worms are said to be self-____.

(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)