Drill #3 Flashcards

1
Q

trojan

A

Malicious software that seems to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system. The term is derived from the Trojan Horse story in Greek mythology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

worm

A

A self-replicating computer program. It sends copies of itself to other computers, and may do so without any user intervention. Unlike a virus, it doesn’t need to attach itself to an existing file. Worms almost always cause at least some harm to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

virus

A

A malicious computer program that infects a file. A true virus can only spread from one computer to another when its host (infected file) is sent to the target computer.

The word “virus” is incorrectly used as an umbrella term for many flavors of viruses, worms and trojans, etc.
Example: A virus gets installed on a laptop. It then inserts itself into several operating system files, causing the computer to restart automatically every 10 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

antivirus

A

Software that monitors a computer or network to identify all major types of malware and prevent or contain malware incidents. Sometimes referred to as AV, which is short for antivirus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

malware

A

Short for the term “malicious software.” It’s an umbrella term used to refer the various types of viruses, worms and trojans, etc. Most malware is installed without the infected person ever realizing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ransomware

A

Vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

rootkit

A

Malicious code that loads into the early loading stages of a computer. The code hides itself from the operating system and other applications that load in the later stages, like antivirus and system utilities. This gives the bad guy full access to alter the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

botnet

A

“robot network,” it’s a collection of “bots,” that live on infected computers, and are controlled by bad guys.

Botnets do many bad things like spew out spam, attack other computers, or send back confidential data to the botnet controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly