Exam 2: Malware and Social Engineering Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Once the malware reaches a system through circulation,then it must embed itself into that system.

(True/False)
4.9/5
(34)

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

(Multiple Choice)
4.9/5
(41)

What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's device?

(Multiple Choice)
4.9/5
(35)

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user,and is typically included in malware?

(Multiple Choice)
4.8/5
(32)

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect,in addition to separating virus code into different pieces and inject these pieces throughout the infected program code.What is the name for this technique?

(Multiple Choice)
4.8/5
(32)

What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

(Multiple Choice)
4.9/5
(39)

Which type of phishing attack targets specific users?

(Multiple Choice)
4.9/5
(34)

What is dumpster diving?

(Essay)
4.7/5
(39)

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?

(Multiple Choice)
4.9/5
(37)

Explain how an appender infection works.

(Essay)
4.7/5
(40)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)