Filters
Question type

Study Flashcards

Due to the prevalence of text filters for filtering spam, how have spammers modified their attacks?

Correct Answer

verifed

verified

Spammers have turned to image ...

View Answer

Match the following terms to the appropriate definitions. -A false warning designed to trick users into changing security settings on their computer​


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:


A) script
B) virus
C) Trojan
D) worm

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​A computer virus that is written in a script known as a macro


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​


A) ​Spam
B) ​Adware
C) ​Watering Hole
D) ​Typo Squatting

Correct Answer

verifed

verified

A macro is a series of instructions that can be grouped together as a single command.​

Correct Answer

verifed

verified

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?


A) rootkit
B) backdoor
C) wrapper
D) shield

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -Software code that gives access to a program or a service that circumvents normal security protections.​


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

What is a worm?

Correct Answer

verifed

verified

A worm is a malicious program that uses ...

View Answer

Which of the following is not one of the four methods for classifying the various types of malware?​


A) ​Circulation
B) ​Infection
C) ​Concealment
D) ​Source

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -A logical computer network of zombies under the control of an attacker.​


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

_______________ is a general term used to describe software that secretly spies on users by collecting information without their consent.​ ​Match the following terms to the appropriate definitions.

Correct Answer

verifed

verified

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

Correct Answer

verifed

verified

Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.

Correct Answer

verifed

verified

What are some of the functions performed by viruses?

Correct Answer

verifed

verified

Viruses have performed the following fun...

View Answer

What is malware?

Correct Answer

verifed

verified

Malware is software that enters a comput...

View Answer

In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.

Correct Answer

verifed

verified

Explain how an appender infection works.

Correct Answer

verifed

verified

The virus first appends itself to the en...

View Answer

Match the following terms to the appropriate definitions. -Computer code that lies dormant until it is triggered by a specific logical event​


A) Adware
B) Backdoor
C) Botnet
D) Computer virus
E) Hoax
F) Keylogger
G) Logic bomb
H) Macro virus
I) Spear phishing
J) Vishing

Correct Answer

verifed

verified

The two types of malware that require user intervention to spread are:


A) Viruses and trojans
B) Rootkits and worms
C) Trojans and worms
D) Rootkits and Trojans

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer