chapter 2 terms and definitions
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | a software program that delivers advertising content in a manner that is unexpected and unwanted by the user
🗑
|
||||
armored virus | show 🗑
|
||||
backdoor | show 🗑
|
||||
bot herder | show 🗑
|
||||
show | logical computer network of zombies under the control of an attacker
🗑
|
||||
command and control | show 🗑
|
||||
show | malicious computer code
🗑
|
||||
dumpster diving | show 🗑
|
||||
hoax | show 🗑
|
||||
impersonation | show 🗑
|
||||
keylogger | show 🗑
|
||||
logic bomb | show 🗑
|
||||
macro | show 🗑
|
||||
macro virus | show 🗑
|
||||
show | software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action
🗑
|
||||
show | malware that rewrites its own code and thus appears different each time it is executed
🗑
|
||||
oligomorphic malware | show 🗑
|
||||
pharming | show 🗑
|
||||
phishing | show 🗑
|
||||
polymorphic malware | show 🗑
|
||||
program virus | show 🗑
|
||||
ransomware | show 🗑
|
||||
rootkit | show 🗑
|
||||
shoulder surfing | show 🗑
|
||||
social engineering | show 🗑
|
||||
spam | show 🗑
|
||||
show | phishing attack that targets only specific users
🗑
|
||||
spim | show 🗑
|
||||
show | general term for software that spies on users by gathering information without consent.
🗑
|
||||
show | when an authorized individual enters a restricted area by following an authorized user
🗑
|
||||
show | executable program that is advertised as performing one action but which actually performs a malicious activity
🗑
|
||||
show | redirecting a user to a fictitious site based on a misspelling of the URL
🗑
|
||||
show | same as typo squatting
🗑
|
||||
show | phishing attack that uses telephone
🗑
|
||||
watering hole attack | show 🗑
|
||||
whaling | show 🗑
|
||||
show | malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system
🗑
|
||||
zombie | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
mcdaniel9097