Deck 2: Malware and Social Engineering Attacks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 2: Malware and Social Engineering Attacks
1
Approximately two out of three malicious Web attacks have been developed using one of four popular attack toolkits.
False
2
Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.
False
3
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.
A) macro
B) metamorphic
C) boot
D) companion
A) macro
B) metamorphic
C) boot
D) companion
D
4
Removing a rootkit from an infected computer is extremely difficult.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
There are almost ____ different Microsoft Windows file extensions that could contain a virus.
A) 50
B) 60
C) 70
D) 80
A) 50
B) 60
C) 70
D) 80
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
In a(n) ____ infection, a virus injects itself into the program's executable code instead of at the end of the file.
A) stealth
B) appender
C) Swiss cheese
D) split
A) stealth
B) appender
C) Swiss cheese
D) split
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A computer ____ is malicious computer code that reproduces itself on the same computer.
A) virus
B) worm
C) adware
D) spyware
A) virus
B) worm
C) adware
D) spyware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ virus infects program executable files.
A) macro
B) program
C) companion
D) boot sector
A) macro
B) program
C) companion
D) boot sector
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Viruses and worms are said to be self-____.
A) duplicating
B) updating
C) copying
D) replicating
A) duplicating
B) updating
C) copying
D) replicating
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Attack toolkits range in price from only $400 to as much as $8,000.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Unlike other malware, a ____ is heavily dependent upon the user for its survival.
A) Trojan
B) worm
C) rootkit
D) virus
A) Trojan
B) worm
C) rootkit
D) virus
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is when an attacker tricks users into giving out information or performing a compromising action.
A) Phreaking
B) Hacking
C) Social engineering
D) Reverse engineering
A) Phreaking
B) Hacking
C) Social engineering
D) Reverse engineering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.
A) rootkit
B) backdoor
C) wrapper
D) shield
A) rootkit
B) backdoor
C) wrapper
D) shield
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ virus infects the Master Boot Record of a hard disk drive.
A) file infector
B) companion
C) resident
D) boot
A) file infector
B) companion
C) resident
D) boot
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ is a program advertised as performing one activity but actually does something else.
A) script
B) virus
C) Trojan
D) worm
A) script
B) virus
C) Trojan
D) worm
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The two types of malware that have the primary objective of spreading are ____.
A) viruses and worms
B) rootkits and worms
C) Trojans and worms
D) rootkits and Trojans
A) viruses and worms
B) rootkits and worms
C) Trojans and worms
D) rootkits and Trojans
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
A) companion
B) file infector
C) resident
D) boot
A) companion
B) file infector
C) resident
D) boot
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.
A) SpyEye
B) NeoSploit
C) ZeuS
D) MPack
A) SpyEye
B) NeoSploit
C) ZeuS
D) MPack
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
A) rootkit
B) macro
C) program
D) process
A) rootkit
B) macro
C) program
D) process
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Describe a macro virus.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What is malware?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The _________________________ contains the program necessary for the computer to start up and a description of how the hard drive is organized (the partition table).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____ involves horizontally separating words, although it is still readable by the human eye.
A) Word splitting
B) GIF layering
C) Geometric variance
D) Layer variance
A) Word splitting
B) GIF layering
C) Geometric variance
D) Layer variance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What is a worm?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
A) Trojan
B) logic bomb
C) macro virus
D) metamorphic virus
A) Trojan
B) logic bomb
C) macro virus
D) metamorphic virus
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
What are botnets?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks.
A) Trojan horse
B) virus
C) bug
D) Easter egg
A) Trojan horse
B) virus
C) bug
D) Easter egg
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What is a backdoor and what is it used for?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are some of the functions performed by viruses?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
A) Adware
B) Keylogger
C) Spam
D) Trojan
A) Adware
B) Keylogger
C) Spam
D) Trojan
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Explain how an appender infection works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
How does a rootkit work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
A) GIF layering
B) Geometric variance
C) Word splitting
D) Layer variance
A) GIF layering
B) Geometric variance
C) Word splitting
D) Layer variance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
____ is an image spam that is divided into multiple images.
A) Word splitting
B) Geometric variance
C) Layer variance
D) GIF layering
A) Word splitting
B) Geometric variance
C) Layer variance
D) GIF layering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are some of the costs involved for spamming?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe adware.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck