What term refers to malicious code that sits dormant until a particular event occurs to release its payload?

  • Shuffle

    Toggle On

    Toggle Off

  • Alphabetize

    Toggle On

    Toggle Off

  • Front First

    Toggle On

    Toggle Off

  • Both Sides

    Toggle On

    Toggle Off

  • Read

    Toggle On

    Toggle Off

Card Range To Study

through

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

  • Share
  • Print
  • Export
  • Clone

18 Cards in this Set

  • Front
  • Back

Large network of zombies used to conduct attacks and spread spam and other malware.

Botnet

A general class of software that is designed for some nefarious purpose.

Malware

A machine on which malware is installed so that it can be controlled by an attacker as part of a botnet.

Zombie

A piece of malicious code that replicates by attaching itself to another piece of executable code.

Virus

A type of malicious software that sits dormant until some event triggers its malicious payload.

Logic Bomb

Software that appears to do one thing but hides some other functionality as well.

Trojan horse

An independent malicious software that that self-replicates by making copies of itself on other systems. It may or may not contain a destructive payload.

Worm

A form of logic bomb in which the triggering event is a specific date or time.

Time bomb

A form of malware that modifies the operating system kernel and supporting functions. It can change thread priorities, perform keylogging, act as a sniffer, hide files, and create backdoors.

Rootkit

The process of assessing the security state of an organization compared against an established standard.

Auditing

A war-driving attack is an attempt to exploit what technology?

Wireless Networks

An attack in which an attacker attempts to lie and misrepresent himself in order to gain access to information that can be useful in an attack is known as:

Social Engineering

Virus hoaxes can be destructive for all of the reasons EXCEPT:

They can record keystrokes when a user visits certain websites

A virus that attempts to evade detection by changing the virus itself, and therefore its signature, is a(n):

Polymorphic Virus

Rootkits are challenging security problems because:

A) They can be invisible to the operating system and end user
B) Their true functionality can be cloaked, preventing analysis
C) They can do virtually anything an operating system can do

A piece of malicious code that must attach itself to another file to replicate itself is known as:

Virus

Which of the following is NOT true about the Morris worm?

It caused infected computers to execute the cat.exe file

A piece of malicious code that appears to be designed to do one thing (and may in fact do that thing) but that hides some other payload (often malicious) is known as:

Trojan Horse

What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?

- network sniffer. - backdoor. - trapdoor. network sniffer. Making data look like it has come from a different source is called.

Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time?

An attack where the attacker captures a portion of a communication between two parties and retransmits it later is called a replay attack.

What is it called when a person registers a domain name relinquishes it in less than five days and then gets the same name again repeating this cycle over and over again?

indirect attack. A person registers a domain name, relinquishes it in less than five days, and then gets the same name again.

What type of software records and reports activities of the user typically without their knowledge?

Cards
Term Making data look like it has come from a different source is called
Definition Spoofing
Term What is software that records and reports activities of the user (typically without their knowledge) called?
Definition SPYWARE
Security ch 15-16 Flashcardswww.flashcardmachine.com › security-ch1516null

Toplist

Neuester Beitrag

Stichworte