Exam 2: Malware and Social Engineering Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms to the appropriate definitions. -Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.​

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

A

Describe adware.

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

42. Adware delivers advertising content in a manner that is unexpected and unwanted by the user. Once it becomes installed, it typically displays advertising banners, popup ads, or opens new web browser windows at random intervals.

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

(Multiple Choice)
4.7/5
(30)

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​

(Multiple Choice)
4.8/5
(28)

Match the following terms to the appropriate definitions. -​A phishing attack that uses telephone calls instead of e-mails.

(Multiple Choice)
4.8/5
(30)

Match the following terms to the appropriate definitions. -​A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

(Multiple Choice)
4.9/5
(30)

What are botnets?

(Essay)
4.7/5
(35)

Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.

(Short Answer)
4.7/5
(32)

What is the term used to describe unsolicited messages received on instant messaging software?

(Multiple Choice)
4.7/5
(37)

What is a backdoor and what is it used for?

(Essay)
4.8/5
(32)

Spreading similarly to a virus, a worm inserts malicious code into a program or data file.

(True/False)
4.9/5
(38)

A macro virus takes advantage of the "____________________" relationship between the application and the operating system.

(Short Answer)
4.9/5
(32)

The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?

(Multiple Choice)
4.7/5
(30)

​What type of system security malware allows for access to a computer, program, or service without authorization?

(Multiple Choice)
4.8/5
(43)

Match the following terms to the appropriate definitions. -​A phishing attack that targets only specific users

(Multiple Choice)
4.9/5
(33)

Which of the following is malicious computer code that reproduces itself on the same computer?

(Multiple Choice)
4.7/5
(39)

A virus that infects an executable program file is known as?

(Multiple Choice)
4.7/5
(39)

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

(Multiple Choice)
4.7/5
(34)

Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?

(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)