Deck 2: Malware and Social Engineering Attacks

ملء الشاشة (f)
exit full mode
سؤال
Approximately two out of three malicious Web attacks have been developed using one of four popular attack toolkits.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.
سؤال
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.

A) macro
B) metamorphic
C) boot
D) companion
سؤال
Removing a rootkit from an infected computer is extremely difficult.
سؤال
There are almost ____ different Microsoft Windows file extensions that could contain a virus.

A) 50
B) 60
C) 70
D) 80
سؤال
In a(n) ____ infection, a virus injects itself into the program's executable code instead of at the end of the file.

A) stealth
B) appender
C) Swiss cheese
D) split
سؤال
A computer ____ is malicious computer code that reproduces itself on the same computer.

A) virus
B) worm
C) adware
D) spyware
سؤال
A ____ virus infects program executable files.

A) macro
B) program
C) companion
D) boot sector
سؤال
Viruses and worms are said to be self-____.

A) duplicating
B) updating
C) copying
D) replicating
سؤال
Attack toolkits range in price from only $400 to as much as $8,000.
سؤال
Unlike other malware, a ____ is heavily dependent upon the user for its survival.

A) Trojan
B) worm
C) rootkit
D) virus
سؤال
____ is when an attacker tricks users into giving out information or performing a compromising action.

A) Phreaking
B) Hacking
C) Social engineering
D) Reverse engineering
سؤال
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
سؤال
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.

A) rootkit
B) backdoor
C) wrapper
D) shield
سؤال
A ____ virus infects the Master Boot Record of a hard disk drive.

A) file infector
B) companion
C) resident
D) boot
سؤال
A ____ is a program advertised as performing one activity but actually does something else.

A) script
B) virus
C) Trojan
D) worm
سؤال
The two types of malware that have the primary objective of spreading are ____.

A) viruses and worms
B) rootkits and worms
C) Trojans and worms
D) rootkits and Trojans
سؤال
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.

A) companion
B) file infector
C) resident
D) boot
سؤال
The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.

A) SpyEye
B) NeoSploit
C) ZeuS
D) MPack
سؤال
A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.

A) rootkit
B) macro
C) program
D) process
سؤال
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
سؤال
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
سؤال
Describe a macro virus.
سؤال
What is malware?
سؤال
The _________________________ contains the program necessary for the computer to start up and a description of how the hard drive is organized (the partition table).
سؤال
____ involves horizontally separating words, although it is still readable by the human eye.

A) Word splitting
B) GIF layering
C) Geometric variance
D) Layer variance
سؤال
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
سؤال
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
سؤال
What is a worm?
سؤال
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.

A) Trojan
B) logic bomb
C) macro virus
D) metamorphic virus
سؤال
What are botnets?
سؤال
A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks.

A) Trojan horse
B) virus
C) bug
D) Easter egg
سؤال
What is a backdoor and what is it used for?
سؤال
What are some of the functions performed by viruses?
سؤال
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

A) Adware
B) Keylogger
C) Spam
D) Trojan
سؤال
Explain how an appender infection works.
سؤال
How does a rootkit work?
سؤال
____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.

A) GIF layering
B) Geometric variance
C) Word splitting
D) Layer variance
سؤال
____ is an image spam that is divided into multiple images.

A) Word splitting
B) Geometric variance
C) Layer variance
D) GIF layering
سؤال
What are some of the costs involved for spamming?
سؤال
Describe adware.
سؤال
Match between columns
executable program advertised as performing one activity, but actually does something else
Trojan
executable program advertised as performing one activity, but actually does something else
Rootkit
executable program advertised as performing one activity, but actually does something else
Spyware
executable program advertised as performing one activity, but actually does something else
Companion virus
executable program advertised as performing one activity, but actually does something else
Image spam
executable program advertised as performing one activity, but actually does something else
Hoax
executable program advertised as performing one activity, but actually does something else
Malware
executable program advertised as performing one activity, but actually does something else
Worm
executable program advertised as performing one activity, but actually does something else
Macro virus
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Trojan
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Rootkit
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Spyware
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Companion virus
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Image spam
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Hoax
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Malware
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Worm
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Macro virus
general term that refers to a wide variety of damaging or annoying software programs
Trojan
general term that refers to a wide variety of damaging or annoying software programs
Rootkit
general term that refers to a wide variety of damaging or annoying software programs
Spyware
general term that refers to a wide variety of damaging or annoying software programs
Companion virus
general term that refers to a wide variety of damaging or annoying software programs
Image spam
general term that refers to a wide variety of damaging or annoying software programs
Hoax
general term that refers to a wide variety of damaging or annoying software programs
Malware
general term that refers to a wide variety of damaging or annoying software programs
Worm
general term that refers to a wide variety of damaging or annoying software programs
Macro virus
series of instructions that can be grouped together as a single command
Trojan
series of instructions that can be grouped together as a single command
Rootkit
series of instructions that can be grouped together as a single command
Spyware
series of instructions that can be grouped together as a single command
Companion virus
series of instructions that can be grouped together as a single command
Image spam
series of instructions that can be grouped together as a single command
Hoax
series of instructions that can be grouped together as a single command
Malware
series of instructions that can be grouped together as a single command
Worm
series of instructions that can be grouped together as a single command
Macro virus
uses graphical images of text in order to circumvent text-based filters
Trojan
uses graphical images of text in order to circumvent text-based filters
Rootkit
uses graphical images of text in order to circumvent text-based filters
Spyware
uses graphical images of text in order to circumvent text-based filters
Companion virus
uses graphical images of text in order to circumvent text-based filters
Image spam
uses graphical images of text in order to circumvent text-based filters
Hoax
uses graphical images of text in order to circumvent text-based filters
Malware
uses graphical images of text in order to circumvent text-based filters
Worm
uses graphical images of text in order to circumvent text-based filters
Macro virus
adds a program to the operating system that is a malicious copycat version to a legitimate program
Trojan
adds a program to the operating system that is a malicious copycat version to a legitimate program
Rootkit
adds a program to the operating system that is a malicious copycat version to a legitimate program
Spyware
adds a program to the operating system that is a malicious copycat version to a legitimate program
Companion virus
adds a program to the operating system that is a malicious copycat version to a legitimate program
Image spam
adds a program to the operating system that is a malicious copycat version to a legitimate program
Hoax
adds a program to the operating system that is a malicious copycat version to a legitimate program
Malware
adds a program to the operating system that is a malicious copycat version to a legitimate program
Worm
adds a program to the operating system that is a malicious copycat version to a legitimate program
Macro virus
general term used to describe software that violates a user's personal security
Trojan
general term used to describe software that violates a user's personal security
Rootkit
general term used to describe software that violates a user's personal security
Spyware
general term used to describe software that violates a user's personal security
Companion virus
general term used to describe software that violates a user's personal security
Image spam
general term used to describe software that violates a user's personal security
Hoax
general term used to describe software that violates a user's personal security
Malware
general term used to describe software that violates a user's personal security
Worm
general term used to describe software that violates a user's personal security
Macro virus
hides or removes traces of log-in records, log entries, and related processes
Trojan
hides or removes traces of log-in records, log entries, and related processes
Rootkit
hides or removes traces of log-in records, log entries, and related processes
Spyware
hides or removes traces of log-in records, log entries, and related processes
Companion virus
hides or removes traces of log-in records, log entries, and related processes
Image spam
hides or removes traces of log-in records, log entries, and related processes
Hoax
hides or removes traces of log-in records, log entries, and related processes
Malware
hides or removes traces of log-in records, log entries, and related processes
Worm
hides or removes traces of log-in records, log entries, and related processes
Macro virus
false warning, often contained in an e-mail message claiming to come from the IT department
Trojan
false warning, often contained in an e-mail message claiming to come from the IT department
Rootkit
false warning, often contained in an e-mail message claiming to come from the IT department
Spyware
false warning, often contained in an e-mail message claiming to come from the IT department
Companion virus
false warning, often contained in an e-mail message claiming to come from the IT department
Image spam
false warning, often contained in an e-mail message claiming to come from the IT department
Hoax
false warning, often contained in an e-mail message claiming to come from the IT department
Malware
false warning, often contained in an e-mail message claiming to come from the IT department
Worm
false warning, often contained in an e-mail message claiming to come from the IT department
Macro virus
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Malware and Social Engineering Attacks
1
Approximately two out of three malicious Web attacks have been developed using one of four popular attack toolkits.
False
2
Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.
False
3
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.

A) macro
B) metamorphic
C) boot
D) companion
D
4
Removing a rootkit from an infected computer is extremely difficult.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
There are almost ____ different Microsoft Windows file extensions that could contain a virus.

A) 50
B) 60
C) 70
D) 80
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
In a(n) ____ infection, a virus injects itself into the program's executable code instead of at the end of the file.

A) stealth
B) appender
C) Swiss cheese
D) split
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
A computer ____ is malicious computer code that reproduces itself on the same computer.

A) virus
B) worm
C) adware
D) spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ____ virus infects program executable files.

A) macro
B) program
C) companion
D) boot sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Viruses and worms are said to be self-____.

A) duplicating
B) updating
C) copying
D) replicating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Attack toolkits range in price from only $400 to as much as $8,000.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
Unlike other malware, a ____ is heavily dependent upon the user for its survival.

A) Trojan
B) worm
C) rootkit
D) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ is when an attacker tricks users into giving out information or performing a compromising action.

A) Phreaking
B) Hacking
C) Social engineering
D) Reverse engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.

A) rootkit
B) backdoor
C) wrapper
D) shield
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
A ____ virus infects the Master Boot Record of a hard disk drive.

A) file infector
B) companion
C) resident
D) boot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ____ is a program advertised as performing one activity but actually does something else.

A) script
B) virus
C) Trojan
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
The two types of malware that have the primary objective of spreading are ____.

A) viruses and worms
B) rootkits and worms
C) Trojans and worms
D) rootkits and Trojans
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.

A) companion
B) file infector
C) resident
D) boot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.

A) SpyEye
B) NeoSploit
C) ZeuS
D) MPack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.

A) rootkit
B) macro
C) program
D) process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Describe a macro virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is malware?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
The _________________________ contains the program necessary for the computer to start up and a description of how the hard drive is organized (the partition table).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
____ involves horizontally separating words, although it is still readable by the human eye.

A) Word splitting
B) GIF layering
C) Geometric variance
D) Layer variance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is a worm?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.

A) Trojan
B) logic bomb
C) macro virus
D) metamorphic virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
What are botnets?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks.

A) Trojan horse
B) virus
C) bug
D) Easter egg
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
What is a backdoor and what is it used for?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
What are some of the functions performed by viruses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

A) Adware
B) Keylogger
C) Spam
D) Trojan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
Explain how an appender infection works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
How does a rootkit work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.

A) GIF layering
B) Geometric variance
C) Word splitting
D) Layer variance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
____ is an image spam that is divided into multiple images.

A) Word splitting
B) Geometric variance
C) Layer variance
D) GIF layering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are some of the costs involved for spamming?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe adware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
executable program advertised as performing one activity, but actually does something else
Trojan
executable program advertised as performing one activity, but actually does something else
Rootkit
executable program advertised as performing one activity, but actually does something else
Spyware
executable program advertised as performing one activity, but actually does something else
Companion virus
executable program advertised as performing one activity, but actually does something else
Image spam
executable program advertised as performing one activity, but actually does something else
Hoax
executable program advertised as performing one activity, but actually does something else
Malware
executable program advertised as performing one activity, but actually does something else
Worm
executable program advertised as performing one activity, but actually does something else
Macro virus
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Trojan
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Rootkit
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Spyware
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Companion virus
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Image spam
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Hoax
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Malware
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Worm
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Macro virus
general term that refers to a wide variety of damaging or annoying software programs
Trojan
general term that refers to a wide variety of damaging or annoying software programs
Rootkit
general term that refers to a wide variety of damaging or annoying software programs
Spyware
general term that refers to a wide variety of damaging or annoying software programs
Companion virus
general term that refers to a wide variety of damaging or annoying software programs
Image spam
general term that refers to a wide variety of damaging or annoying software programs
Hoax
general term that refers to a wide variety of damaging or annoying software programs
Malware
general term that refers to a wide variety of damaging or annoying software programs
Worm
general term that refers to a wide variety of damaging or annoying software programs
Macro virus
series of instructions that can be grouped together as a single command
Trojan
series of instructions that can be grouped together as a single command
Rootkit
series of instructions that can be grouped together as a single command
Spyware
series of instructions that can be grouped together as a single command
Companion virus
series of instructions that can be grouped together as a single command
Image spam
series of instructions that can be grouped together as a single command
Hoax
series of instructions that can be grouped together as a single command
Malware
series of instructions that can be grouped together as a single command
Worm
series of instructions that can be grouped together as a single command
Macro virus
uses graphical images of text in order to circumvent text-based filters
Trojan
uses graphical images of text in order to circumvent text-based filters
Rootkit
uses graphical images of text in order to circumvent text-based filters
Spyware
uses graphical images of text in order to circumvent text-based filters
Companion virus
uses graphical images of text in order to circumvent text-based filters
Image spam
uses graphical images of text in order to circumvent text-based filters
Hoax
uses graphical images of text in order to circumvent text-based filters
Malware
uses graphical images of text in order to circumvent text-based filters
Worm
uses graphical images of text in order to circumvent text-based filters
Macro virus
adds a program to the operating system that is a malicious copycat version to a legitimate program
Trojan
adds a program to the operating system that is a malicious copycat version to a legitimate program
Rootkit
adds a program to the operating system that is a malicious copycat version to a legitimate program
Spyware
adds a program to the operating system that is a malicious copycat version to a legitimate program
Companion virus
adds a program to the operating system that is a malicious copycat version to a legitimate program
Image spam
adds a program to the operating system that is a malicious copycat version to a legitimate program
Hoax
adds a program to the operating system that is a malicious copycat version to a legitimate program
Malware
adds a program to the operating system that is a malicious copycat version to a legitimate program
Worm
adds a program to the operating system that is a malicious copycat version to a legitimate program
Macro virus
general term used to describe software that violates a user's personal security
Trojan
general term used to describe software that violates a user's personal security
Rootkit
general term used to describe software that violates a user's personal security
Spyware
general term used to describe software that violates a user's personal security
Companion virus
general term used to describe software that violates a user's personal security
Image spam
general term used to describe software that violates a user's personal security
Hoax
general term used to describe software that violates a user's personal security
Malware
general term used to describe software that violates a user's personal security
Worm
general term used to describe software that violates a user's personal security
Macro virus
hides or removes traces of log-in records, log entries, and related processes
Trojan
hides or removes traces of log-in records, log entries, and related processes
Rootkit
hides or removes traces of log-in records, log entries, and related processes
Spyware
hides or removes traces of log-in records, log entries, and related processes
Companion virus
hides or removes traces of log-in records, log entries, and related processes
Image spam
hides or removes traces of log-in records, log entries, and related processes
Hoax
hides or removes traces of log-in records, log entries, and related processes
Malware
hides or removes traces of log-in records, log entries, and related processes
Worm
hides or removes traces of log-in records, log entries, and related processes
Macro virus
false warning, often contained in an e-mail message claiming to come from the IT department
Trojan
false warning, often contained in an e-mail message claiming to come from the IT department
Rootkit
false warning, often contained in an e-mail message claiming to come from the IT department
Spyware
false warning, often contained in an e-mail message claiming to come from the IT department
Companion virus
false warning, often contained in an e-mail message claiming to come from the IT department
Image spam
false warning, often contained in an e-mail message claiming to come from the IT department
Hoax
false warning, often contained in an e-mail message claiming to come from the IT department
Malware
false warning, often contained in an e-mail message claiming to come from the IT department
Worm
false warning, often contained in an e-mail message claiming to come from the IT department
Macro virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.