10-1 Flashcards

1
Q

a small file containing data that is put on you machine by a website you vist

A

cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a type of trojan horse that another program onto the target machine

A

dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a list of entities together with their access rights that are authorized to have access to a resource

A

access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

malware that seeks to create pop-up ads on the machine and eventually drains the machine’s resources until the machine becomes completely unusable

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

spyware that is loaded as a java applet embedded in a web page

A

RedSheriff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a remote administration system that allows a user to control a computer across a WCP/IP connection using a simple console or GUI Application

A

Back Orfice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a type of trojan horse that repackages legitimate android apps such as Facebook or the game candy crush and includes adware with them

A

shedun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a type of trojan horse that appears as an IQ test application and installs a rootkit on the target system

A

brain test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One defense against trojan horses is to prevent all ____________ , but this is not particulaly practical

A

downloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

common trojan horse actions include

A
erasing files
spreading other malware
use for DOS
look for personal info
install a backdoor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_________ gives the remote user as much , if not more control of the target machine then the person who downloaded it. small and entirely self installing

A

Back orfice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it can be attached to any other windows executable which run normally after installing the server.

A

back orfice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

back orfice does not show up inthe task list or __________ list

A

close program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this program is launched every time the computer is started

A

back orfice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this can infect windows XP, Vista, and 7. and poses as an anti-spyware program. it actually disables security-related processes of antivirus programs. it will alter the windows registry. the user will receive a bunch of false security messages

A

Anti-spyware 2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly