Chapter 5: Malware and Social Engineering Flashcards

1
Q

a general term that refers to the wide variety of damaging and annoying software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 TYPES OF MALWARES:

A
  1. Viruses
  2. Worms
  3. Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are malwares that cannot automatically spread to another computer.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 TYPES OF VIRUSES

A
  • Computer Virus
  • Program Virus
  • Macro
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

malicious computer code that reproduces itself.

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are virus that infects and executable program file.

A

Program Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a series of instruction that can be grouped together as a single command.

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are malicious programs that uses a computer network to replicate.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

an executable program that does something other than advertised.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Contains hidden code that launches an attack.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 TYPES OF MALWARES THAT COLLECT DATA

A
  1. Spyware
  2. Adware
  3. Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

software that gather information without user consent.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

captures and stores each keystroke that a user type on the computer’s keyboard.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

program that delivers advertising content in manner unexpected and unwanted by the user.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

prevents a user’s device from properly operating until fee is paid.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

[3] OTHER TYPES OF MALWARES

A
  1. Logic Bomb
  2. Backdoor
  3. Zombie
17
Q

a computer code that lies dormant until it is triggered by a specific logical event.

A

Logic Bomb

18
Q

gives access to a computer, program, service that circumvent normal security to give program access.

19
Q

an infected computer that is under the remote control of an attacker.

20
Q

are group of zombie computer that are gathered into a logical network.

21
Q

a means of gathering information for an attack by relying on the weaknesses of an individual.

A

Social Engineering

22
Q

6 TYPES OF SOCIAL ENGINEERING

A
  1. Impersonation
  2. Phishing
  3. Spam
  4. Typo Squatting
  5. Dumpster Diving
  6. Tailgating
23
Q

attacker pretends to be someone else.

A

Impersonation

24
Q

sending an email to be from legitimate source

25
4 TYPES OF PHISHING
* Pharming * Spear Phishing * Whaling * Vishing (Voice Phishing)
26
a variant of phishing that automatically redirect user to a fraudulent website.
Pharming
27
variant of phishing : email messaged that target specific users.
Spear Phishing
28
type of phishing that target the “big fish” – wealthy individuals.
Whaling
29
attacker calls victim with recorded “bank” message with callback number.
Vishing (Voice Phishing
30
are unsolicited emails.
Spam
31
redirecting user to a fictitious website based on misspelling of the URL.
Typo Squatting
32
digging through trash to find information that can be useful in an attack.
Dumpster Diving
33
attacker follow behind an authorized individual through an access door,
Tailgating