Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
two types of spreading malware   viruses and worms  
🗑
biological virus   agent that reproduces inside a cell  
🗑
malware   refers to a wide variety of damaging or annoying software programs  
🗑
virus   malicious computer code that reproduces itself on the same pc  
🗑
ways in which a virus enters a program   appender infection  
🗑
ways in which a virus enters a program   swiss cheese infection  
🗑
ways in which a virus enters a program   split infection  
🗑
malware   malicious software  
🗑
malware objectives   infecting systems  
🗑
malware objectives   concealing its purpose  
🗑
malware objectives   making profit  
🗑
program virus   infects program executable files  
🗑
macro virus   written in a script,set of instructions  
🗑
resident virus   loaded into random access memory  
🗑
boot virus   infects the master boot record  
🗑
companion virus   adds a program to the operating system that is a malicious copycat version to a legitimate program  
🗑
worm   malicious program designed to take advantage of a vulnerability in an application to enter a pc  
🗑
trojan horse   executable program advertised as performing one activity but does something else  
🗑
virus infection methods   appender infection  
🗑
appender infection   adds itself to the end of a file  
🗑
viruses   insert code into file  
🗑
worms   exploit vulnerabilities in an application  
🗑
virus   self replicates on only local pc  
🗑
worm   self replicate between computers  
🗑
trojan   installed on the pc with users knowledge  
🗑
actions that viruses have performed   computer crashes  
🗑
actions that viruses have performed   erased files from hard drive  
🗑
actions that viruses have performed   turn off security settings  
🗑
actions that viruses have performed   reformat hard disk  
🗑
actions that viruses have performed   make multiple copies consume hard drive  
🗑
virus needs two carriers   a file to which it attached  
🗑
virus needs two carriers   a human to transport it to others  
🗑
concealing malware includes   trojans  
🗑
concealing malware includes   rootkits  
🗑
concealing malware includes   logic bombs  
🗑
concealing malware includes   backdoors  
🗑
rootkit   set of software tools used by an attacker to hide the actions or presence of other types of malicious software  
🗑
root   highest level of privileges available in unix  
🗑
two steps in removing a rootkit   erase the rootkit  
🗑
two steps in removing a rootkit   the portions of the os programs and files that were altered must be replaced with the original files  
🗑
only safe and foolproof way to handle a rootkit infection   reformat the hard drive and reinstall the operating system  
🗑
logic bomb   computer code that lies dormant until it is triggered by a specific logical event  
🗑
backdoor   software code that gives access to a program or service that circumvents any normal security protections  
🗑
rootkits   hide or remove traces of log in records,log entries  
🗑
infected robot bot pc   program that will allow the infected computer to be placed under the remote control of an attacker  
🗑
zombie   infected robot pc  
🗑
botnet   a logical network of zombies under control of an attacker  
🗑
bot herder    
🗑
internet relay chat    
🗑
types of botnet attacks   spamming  
🗑
types of botnet attacks   spreading malware  
🗑
types of botnet attacks   attacking irc networks  
🗑
types of botnet attacks   manipulating online polls  
🗑
types of botnet attacks   denying services  
🗑
technologies used by spyware   automatic download software  
🗑
technologies used by spyware   passive tracking technologies  
🗑
technologies used by spyware   system modifying software  
🗑
technologies used by spyware   tracking software  
🗑
spyware   software that spies on users by gathering information without their consent  
🗑
malware that spreads    
🗑
malware that conceals    
🗑
botnet   program that allows it to be remotely controlled by an attacker  
🗑
malware that profits    
🗑
negative effects of spyware   slow pc performance  
🗑
negative effects of spyware   system instability  
🗑
negative effects of spyware   new browser toolbars or menus  
🗑
negative effects of spyware   new shortcuts  
🗑
negative effects of spyware   hijacked home page  
🗑
negative effects of spyware   increased pop ups  
🗑
adware   program that delivers advertising content in a manner that is unexpected and unwanted by a user  
🗑
keylogger   captures and stores each keystroke that a user types  
🗑
keylogger can be   small hardware device or a software program  
🗑
software keyloggers   programs installed on the computer that silently capture sensitive information  
🗑
software keyloggers   do not require physical access  
🗑
hardware keyloggers   physically install and removed later  
🗑
social engineering   means of gathering information for an attack by reling on the weakness of individuals  
🗑
social engineering psychological approaches   impersonation  
🗑
social engineering psychological approaches   phishing  
🗑
social engineering psychological approaches   spam  
🗑
social engineering psychological approaches   hoaxes  
🗑
variations on phishing attacks   pharming  
🗑
variations on phishing attacks   spear phishing  
🗑
variations on phishing attacks   whaling  
🗑
variations on phishing attacks   vishing  
🗑
phishing   sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user in surrendering private info  
🗑
pharming   automatically redirects the user to the fake site  
🗑
spear phishing   emails that targets specific users  
🗑
whaling   targets only wealthy individuals  
🗑
vishing   phishing attack that uses a phone call instead of email  
🗑
spam   unsolicited email  
🗑
hoax   a false warning  
🗑
dumpster diving   digging thru trash receptacles to find info  
🗑
tailgating   unauthorized person enters a building by following an authorized person  
🗑
spim   targets instant messaging users instead of email users  
🗑
piggybacking   unauthorized person enters a building by following an authorized person  
🗑
shoulder surfing   watching an authorized user enter a security code on a keypad  
🗑
malware that spreads   viruses  
🗑
malware that spreads   worms  
🗑
malware that conceals   trojans  
🗑
malware that conceals   rootkits  
🗑
malware that conceals   logic bombs  
🗑
malware that conceals   backdoors  
🗑
malware that profits   botnets  
🗑
malware that profits   spyware  
🗑
malware that profits   adware  
🗑
malware that profits   keyloggers  
🗑
social engineering attacks   impersonation  
🗑
social engineering attacks   phishing  
🗑
social engineering attacks   spam  
🗑
social engineering attacks   hoaxes  
🗑
social engineering attacks   pharming  
🗑
social engineering attacks   spear phishing  
🗑
social engineering attacks   whaling  
🗑
social engineering attacks   vishing  
🗑
most common physical procedure attacks   dumpster diving  
🗑
most common physical procedure attacks   tailgating  
🗑
types of spamming   gif layering  
🗑
types of spamming   word splitting  
🗑
types of spamming   geometric variance  
🗑
types of spamming   image spam  
🗑
dumpster diving items   calendars  
🗑
dumpster diving items   memos  
🗑
dumpster diving items   phone directories  
🗑
dumpster diving items   organizational charts  
🗑
dumpster diving items   policy manuals  
🗑
dumpster diving items   system manuals  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: cgeaski
Popular Computers sets