Exam 2: Malware and Social Engineering Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What type of malware is heavily dependent on a user in order to spread?

(Multiple Choice)
4.9/5
(39)

Match the following terms to the appropriate definitions. -Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.​

(Multiple Choice)
4.8/5
(33)

How does a rootkit work?

(Essay)
4.8/5
(27)

Describe a macro virus.

(Essay)
4.8/5
(30)

How many different Microsoft Windows file types can be infected with a virus?

(Multiple Choice)
4.8/5
(36)

Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?​

(Multiple Choice)
4.8/5
(39)

A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.

(Short Answer)
4.8/5
(37)

What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?

(Multiple Choice)
4.8/5
(35)

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?

(Multiple Choice)
4.7/5
(38)

Successful attacks on computers today consist of a single element, malicious​ software programs that are created to infiltrate computers with the intent to do harm.

(True/False)
4.8/5
(36)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)