Matching
Match each item with a statement below:
Premises:
executable program advertised as performing one activity, but actually does something else
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
general term that refers to a wide variety of damaging or annoying software programs
series of instructions that can be grouped together as a single command
uses graphical images of text in order to circumvent text-based filters
adds a program to the operating system that is a malicious copycat version to a legitimate program
general term used to describe software that violates a user's personal security
hides or removes traces of log-in records, log entries, and related processes
false warning, often contained in an e-mail message claiming to come from the IT department
Responses:
Trojan
Rootkit
Spyware
Image spam
Hoax
Worm
Malware
Companion virus
Macro virus
Correct Answer:
Premises:
Responses:
executable program advertised as performing one activity, but actually does something else
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
general term that refers to a wide variety of damaging or annoying software programs
series of instructions that can be grouped together as a single command
uses graphical images of text in order to circumvent text-based filters
adds a program to the operating system that is a malicious copycat version to a legitimate program
general term used to describe software that violates a user's personal security
hides or removes traces of log-in records, log entries, and related processes
false warning, often contained in an e-mail message claiming to come from the IT department
Premises:
executable program advertised as performing one activity, but actually does something else
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
general term that refers to a wide variety of damaging or annoying software programs
series of instructions that can be grouped together as a single command
uses graphical images of text in order to circumvent text-based filters
adds a program to the operating system that is a malicious copycat version to a legitimate program
general term used to describe software that violates a user's personal security
hides or removes traces of log-in records, log entries, and related processes
false warning, often contained in an e-mail message claiming to come from the IT department
Responses:
Related Questions
Q1: A _ is a series of instructions
Q3: A(n) _ virus adds a program to
Q4: A _ virus infects program executable files.<br>A)
Q6: Approximately two out of three malicious Web
Q8: _ is an image spam that is
Q10: A _ is a computer program or
Q11: A computer _ is malicious computer code
Q16: How does a rootkit work?
Q36: Software keyloggers are programs that silently capture
Q40: What are some of the functions performed