Chapter 2 Flashcards

1
Q

malware

A

Software designed to infiltrate a computer system and possibly damage it
without the user’s knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

virus

A

Code that runs on a computer without the user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

worm

A

Code that runs on a computer without the user’s knowledge; a worm selfreplicates,
whereas a virus does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horse

A

An application that appears to perform desired functions but is actually
performing malicious functions behind the scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ransomware

A

A type of malware that restricts access to a computer system, and demands
a ransom be paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

spyware

A

A type of malicious software either downloaded unwittingly from a website or
installed along with some other third-party software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

adware

A

Type of spyware that pops up advertisements based on what it has learned
about the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

grayware

A

applications that are behaving improperly
but without serious consequences; often describes types of spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

rootkit,

A

A type of software designed to gain administrator-level control over a computer
system without being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spam

A

The abuse of electronic messaging systems such as e-mail, broadcast media, and
instant messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

threat vector

A

The method a threat uses to gain access to a target computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

attack vector

A

The path or means by which an attacker gains access to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

typosquatting

A

A method used by attackers that takes advantage of user
typos when accessing websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

botnet

A

group of compromised computers used to distribute malware across the
Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

active
interception

A

Normally refers to placing a computer between the sender and
the receiver in an effort to capture and possibly modify information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

privilege escalation

A

The act of exploiting a bug or design flaw in a software or fi rmware
application to gain access to resources that normally would’ve been protected from
an application or user.

17
Q

time bomb

A

Trojan set off on a certain date.

18
Q

open mail relay

A

enables anyone on the Internet to
send e-mail through an SMTP server.

19
Q

hardware security module

A

physical device that deals with the encryption of
authentication processes, digital signings, and payment processes.

20
Q

bluejacking

A

The sending of unsolicited messages to Bluetooth-enabled devices such as
mobile phones and tablets.

21
Q

bluesnarfing

A

The unauthorized access of information from a wireless device through a
Bluetooth connection.

22
Q

storage segmentation

A

A clear separation of organizational and personal information,
applications, and other content.

23
Q

mobile device management (MDM)

A

A centralized software solution that allows for the
control and confi guration of mobile devices.