1.2 Examples Flashcards
(6 cards)
1
Q
monitors computer and user’s activities
A
Spyware
2
Q
left by an old employee
A
logic bomb
3
Q
both will demand that a ransom be paid to regain access to data/computers
A
Cryptoware and Ransomware
4
Q
becomes apart of virus system so anti-virus/anti-malware can’t detect it
A
Rootkit
5
Q
downloads password files and compare hashes
A
Offline Password Attack
6
Q
If an attacker captures an encrypted message and knows the unencrypted plaintext of the message, they can use both sets of data to discover the encryption and decryption method
A
Plaintext/Unencrypted Attack