click below
click below
Normal Size Small Size show me how
ITS 470 Chapter 2
Malware and Social Engineering
| Question | Answer |
|---|---|
| the most popular attack toolkit, which has almost 1/2 of the attacker toolkit market | Zeus |
| Is when an attacker tricks users into giving out information or performing a compromising action | social engineering |
| two types of malware that have the primary objective of spreading are: | viruses and worms |
| A computer ______ is a malicious computer code that reproduces itself on the same computer | virus |
| In a(n) __________ infection, a virus injects itself into the program's executable code instead of at the end of the file. | Swiss Cheese |
| Unlike other malware, a ______ is heavily dependent on the user for survival. | virus |
| A _____ virus is loaded into random access memory each time the computer is turned on and infects files that are opened by the user or the operating system. | resident |
| A ______ virus infects the master boot record of the hard disk drive. | boot |
| There are almost _____ different Microsoft window file extensions that could contain a virus. | 70 |
| a ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks | macro |
| A(n) _____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program. | companion |
| Viruses and worms are said to be: | self-replicating |
| A _____ is a program advertised as performing one activity but actually does something else. | trojan |
| A ____ set of software tools used by an attacker to hide the actions of presence of other types of malicious software, such as trojans, virus or worms. | rootkit |
| A ______ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event. | logic bomb |
| A _____ refers to an undocumented hidden feature that launches by entering a series of special commands. | Easter egg |
| ____ is a program that delivers advertising content in a manner that is unexpected and unwanted by the user. | Adware |
| ______ is an image spam that is divided into multiple images | gif layering |
| involves horizontally separating words, still in a readable form. | word splitting |
| Uses "speckling" and different colors so that no two spam emails appear to be same. | geometric variance |