Filters
Question type

Study Flashcards

Spreading similarly to a virus, a worm inserts malicious code into a program or data file.

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​A phishing attack that targets only specific users


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?


A) ​Dumpster diving
B) ​Tailgating
C) ​Stalking
D) ​Shadowing

Correct Answer

verifed

verified

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?


A) Adware
B) Keylogger
C) Spam
D) Trojan

Correct Answer

verifed

verified

A

Match the following terms to the appropriate definitions. -​A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​A phishing attack that uses telephone calls instead of e-mails.


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

Which of the following is malicious computer code that reproduces itself on the same computer?


A) virus
B) worm
C) adware
D) spyware

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.​


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

D

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?


A) stealth
B) appender
C) Swiss cheese
D) split

Correct Answer

verifed

verified

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:


A) A rootkit
B) A macro
C) A program
D) A process

Correct Answer

verifed

verified

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​


A) ​Lockware
B) ​Ransomware
C) ​Stealware
D) ​Hostageware

Correct Answer

verifed

verified

Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.

Correct Answer

verifed

verified

What is the term used to describe unsolicited messages received on instant messaging software?


A) ​Spam
B) ​Spim
C) ​Splat
D) Crust

Correct Answer

verifed

verified

What are botnets?

Correct Answer

verifed

verified

Botnets are collections of tho...

View Answer

​What type of system security malware allows for access to a computer, program, or service without authorization?


A) ​Botnet
B) ​Zombie
C) ​Backdoor
D) ​Command and Control

Correct Answer

verifed

verified

Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?


A) Trojan
B) logic bomb
C) macro virus
D) metamorphic virus

Correct Answer

verifed

verified

What is a backdoor and what is it used for?

Correct Answer

verifed

verified

A backdoor gives access to a computer, p...

View Answer

Describe adware.

Correct Answer

verifed

verified

42. Adware delivers advertising content in a manner that is unexpected and unwanted by the user. Once it becomes installed, it typically displays advertising banners, popup ads, or opens new web browser windows at random intervals.

A macro virus takes advantage of the "____________________" relationship between the application and the operating system.

Correct Answer

verifed

verified

A virus that infects an executable program file is known as?


A) macro virus
B) program virus
C) companion virus
D) boot sector virus

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer