- Shuffle
Toggle On
Toggle Off
- Alphabetize
Toggle On
Toggle Off
- Front First
Toggle On
Toggle Off
- Both Sides
Toggle On
Toggle Off
- Read
Toggle On
Toggle Off
Card Range To Study
through
Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
- Share
- Export
- Clone
18 Cards in this Set
- Front
- Back
Large network of zombies used to conduct attacks and spread spam and other malware. | Botnet | |
A general class of software that is designed for some nefarious purpose. | Malware | |
A machine on which malware is installed so that it can be controlled by an attacker as part of a botnet. | Zombie | |
A piece of malicious code that replicates by attaching itself to another piece of executable code. | Virus | |
A type of malicious software that sits dormant until some event triggers its malicious payload. | Logic Bomb | |
Software that appears to do one thing but hides some other functionality as well. | Trojan horse | |
An independent malicious software that that self-replicates by making copies of itself on other systems. It may or may not contain a destructive payload. | Worm | |
A form of logic bomb in which the triggering event is a specific date or time. | Time bomb | |
A form of malware that modifies the operating system kernel and supporting functions. It can change thread priorities, perform keylogging, act as a sniffer, hide files, and create backdoors. | Rootkit | |
The process of assessing the security state of an organization compared against an established standard. | Auditing | |
A war-driving attack is an attempt to exploit what technology? | Wireless Networks | |
An attack in which an attacker attempts to lie and misrepresent himself in order to gain access to information that can be useful in an attack is known as: | Social Engineering | |
Virus hoaxes can be destructive for all of the reasons EXCEPT: | They can record keystrokes when a user visits certain websites | |
A virus that attempts to evade detection by changing the virus itself, and therefore its signature, is a(n): | Polymorphic Virus | |
Rootkits are challenging security problems because: | A) They can be invisible to the operating system and end user | |
A piece of malicious code that must attach itself to another file to replicate itself is known as: | Virus | |
Which of the following is NOT true about the Morris worm? | It caused infected computers to execute the cat.exe file | |
A piece of malicious code that appears to be designed to do one thing (and may in fact do that thing) but that hides some other payload (often malicious) is known as: | Trojan Horse |
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?
Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time?
What is it called when a person registers a domain name relinquishes it in less than five days and then gets the same name again repeating this cycle over and over again?
What type of software records and reports activities of the user typically without their knowledge?
Term Making data look like it has come from a different source is called | Definition Spoofing |
Term What is software that records and reports activities of the user (typically without their knowledge) called? | Definition SPYWARE |