Exam 2: Malware and Social Engineering Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms to the appropriate definitions. -A false warning designed to trick users into changing security settings on their computer​

(Multiple Choice)
4.9/5
(31)

What are some of the functions performed by viruses?

(Essay)
4.7/5
(39)

Due to the prevalence of text filters for filtering spam, how have spammers modified their attacks?

(Essay)
4.9/5
(30)

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

(Multiple Choice)
4.7/5
(35)

Match the following terms to the appropriate definitions. -Computer code that lies dormant until it is triggered by a specific logical event​

(Multiple Choice)
4.7/5
(32)

Match the following terms to the appropriate definitions. -​A computer virus that is written in a script known as a macro

(Multiple Choice)
4.8/5
(34)

Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:

(Multiple Choice)
4.8/5
(37)

_______________ is a general term used to describe software that secretly spies on users by collecting information without their consent.​ ​Match the following terms to the appropriate definitions.

(Short Answer)
4.9/5
(31)

Match the following terms to the appropriate definitions. -A logical computer network of zombies under the control of an attacker.​

(Multiple Choice)
4.9/5
(36)

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​

(Multiple Choice)
4.8/5
(35)

What is a worm?

(Essay)
4.9/5
(43)

Which of the following is not one of the four methods for classifying the various types of malware?​

(Multiple Choice)
4.8/5
(35)

Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.

(True/False)
4.9/5
(38)

What is malware?

(Essay)
4.9/5
(27)

Match the following terms to the appropriate definitions. -Software code that gives access to a program or a service that circumvents normal security protections.​

(Multiple Choice)
4.8/5
(31)

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

(True/False)
4.7/5
(29)

A macro is a series of instructions that can be grouped together as a single command.​

(True/False)
4.8/5
(24)

The two types of malware that require user intervention to spread are:

(Multiple Choice)
4.8/5
(28)

In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.

(Short Answer)
4.7/5
(30)

Explain how an appender infection works.

(Essay)
4.9/5
(34)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)