Filters
Question type

Study Flashcards

What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?


A) Phreaking
B) Hacking
C) Social engineering
D) Reverse engineering

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Successful attacks on computers today consist of a single element, malicious​ software programs that are created to infiltrate computers with the intent to do harm.

A) True
B) False

Correct Answer

verifed

verified

Describe a macro virus.

Correct Answer

verifed

verified

A macro virus is written in a script kno...

View Answer

Match the following terms to the appropriate definitions. -Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.​


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

K) E) and G)
L) B) and C)

Correct Answer

verifed

verified

How many different Microsoft Windows file types can be infected with a virus?


A) 50
B) 60
C) 70
D) 80

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What type of malware is heavily dependent on a user in order to spread?


A) Trojan
B) worm
C) rootkit
D) virus

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

How does a rootkit work?

Correct Answer

verifed

verified

One approach used by rootkits is to alte...

View Answer

Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?​


A) Oligomorphic malware​
B) ​Polymorphic malware
C) ​Metamorphic malware
D) ​Statimorphic malware

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.

Correct Answer

verifed

verified

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?


A) Trojan horse
B) virus
C) bug
D) Easter egg

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer