Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CompTI Fundamentals

Chapter 8: Security Threats

QuestionAnswer
Which of the following are activities that a hacker might attempt? All of the above
You receive a warning from your antivirus software provider stating that a new virus is directly attacking the antivirus software. What type of virus is this? Retrovirus
Which of the following are considered physical security risks? Software theft
What is the name of an application that appears to look like a helpful application but instead does harm to your computer? Trojan horse
Someone was recently caught sifting through your company's trash looking for confidential information. What is this an example of? Dumpster diving
IT security recently found a program on your co-worker's computer that apparently tracked all of the words they typed into the computer. What kind of malware is this? Keylogger
What type of malware is best known for carrying other malware as a payload? Worm
You receive an email from your bank, telling you that your account has been compromised and you need to validate your account details or else your account will be closed. You are supposed to click a link to validate your information. What is this an examp Phishing
Rose just installed a new search engine on her laptop. Now whenever she searches the Internet, she gets several pop-up windows directing her to websites to buy products. What does Rose have? Adware
What is it called when a co-worker sitting next to you always seems to look your way when you try to enter your ID and password to log into the network? Shoulder surfing
The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the server password and no one knows what it is. What might you do in this type of situation? Use a password cracker to find the password
Which of the following operating systems are susceptible to viruses? Windows, Mac OS X, and Android
What type of software is used to circumvent normal security processes on a computer? Backdoor
A virus that covers itself in protective code, making it harder to find and eradicate, is called what? Armored virus
You were browsing the Web on a questionable website, and now you get a pop-up window stating that if you do not pay $100 within an hour, all files on your computer will be destroyed. What is this an example of? Ransomware
You believe that your computer has contracted a virus that has affected your Excel files only. What type of virus is most likely to do this? Macro
What does the term spam refer to in computing? Unsolicited emails
If a virus attacks the boot sector of your hard drive as well as files in the file system, what type of virus is it? Multipartite
David just heard of a program that if installed on your computer give the attacker administrator-like access to your machine. What type of software is he talking about? Rootkit
Created by: itsme.shy