Deck 2: Malware and Social Engineering Attacks

ملء الشاشة (f)
exit full mode
سؤال
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?​

A)Oligomorphic malware​
B)​Polymorphic malware
C)​Metamorphic malware
D)​Statimorphic malware
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is the term used to describe unsolicited messages received on instant messaging software?

A)​Spam
B)​Spim
C)​Splat
D)Crust
سؤال
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

A)rootkit
B)backdoor
C)wrapper
D)shield
سؤال
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​

A)​Spam
B)​Adware
C)​Watering Hole
D)​Typo Squatting
سؤال
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?

A)Trojan
B)logic bomb
C)macro virus
D)metamorphic virus
سؤال
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
سؤال
Successful attacks on computers today consist of a single element, malicious​ software programs that are created to infiltrate computers with the intent to do harm.
سؤال
Which of the following is not one of the four methods for classifying the various types of malware?​

A)​Circulation
B)​Infection
C)​Concealment
D)​Source
سؤال
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
سؤال
Which of the following is malicious computer code that reproduces itself on the same computer?

A)virus
B)worm
C)adware
D)spyware
سؤال
What type of malware is heavily dependent on a user in order to spread?

A)Trojan
B)worm
C)rootkit
D)virus
سؤال
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

A)A rootkit
B)A macro
C)A program
D)A process
سؤال
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

A)stealth
B)appender
C)Swiss cheese
D)split
سؤال
A macro is a series of instructions that can be grouped together as a single command.​
سؤال
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
سؤال
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?

A)Phreaking
B)Hacking
C)Social engineering
D)Reverse engineering
سؤال
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:

A)script
B)virus
C)Trojan
D)worm
سؤال
How many different Microsoft Windows file types can be infected with a virus?

A)50
B)60
C)70
D)80
سؤال
The two types of malware that require user intervention to spread are:

A)Viruses and trojans
B)Rootkits and worms
C)Trojans and worms
D)Rootkits and Trojans
سؤال
A virus that infects an executable program file is known as?

A)macro virus
B)program virus
C)companion virus
D)boot sector virus
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.​
سؤال
_______________ is a general term used to describe software that secretly spies on users by collecting information without their consent.​
​Match the following terms to the appropriate definitions.
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Software code that gives access to a program or a service that circumvents normal security protections.​
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A computer virus that is written in a script known as a macro
سؤال
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A phishing attack that targets only specific users
سؤال
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

A)Adware
B)Keylogger
C)Spam
D)Trojan
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.​
سؤال
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?

A)​Dumpster diving
B)​Tailgating
C)​Stalking
D)​Shadowing
سؤال
​What type of system security malware allows for access to a computer, program, or service without authorization?

A)​Botnet
B)​Zombie
C)​Backdoor
D)​Command and Control
سؤال
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?

A)Trojan horse
B)virus
C)bug
D)Easter egg
سؤال
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Computer code that lies dormant until it is triggered by a specific logical event​
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A phishing attack that uses telephone calls instead of e-mails.
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
A false warning designed to trick users into changing security settings on their computer​
سؤال
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
A logical computer network of zombies under the control of an attacker.​
سؤال
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
سؤال
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​

A)​Lockware
B)​Ransomware
C)​Stealware
D)​Hostageware
سؤال
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
سؤال
What is a worm?
سؤال
Due to the prevalence of text filters for filtering spam, how have spammers modified their attacks?
سؤال
What are some of the functions performed by viruses?
سؤال
What are botnets?
سؤال
Explain how an appender infection works.
سؤال
What is a backdoor and what is it used for?
سؤال
Describe adware.
سؤال
How does a rootkit work?
سؤال
What is malware?
سؤال
Describe a macro virus.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Malware and Social Engineering Attacks
1
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?​

A)Oligomorphic malware​
B)​Polymorphic malware
C)​Metamorphic malware
D)​Statimorphic malware
A
2
What is the term used to describe unsolicited messages received on instant messaging software?

A)​Spam
B)​Spim
C)​Splat
D)Crust
B
3
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

A)rootkit
B)backdoor
C)wrapper
D)shield
A
4
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​

A)​Spam
B)​Adware
C)​Watering Hole
D)​Typo Squatting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?

A)Trojan
B)logic bomb
C)macro virus
D)metamorphic virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Successful attacks on computers today consist of a single element, malicious​ software programs that are created to infiltrate computers with the intent to do harm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is not one of the four methods for classifying the various types of malware?​

A)​Circulation
B)​Infection
C)​Concealment
D)​Source
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is malicious computer code that reproduces itself on the same computer?

A)virus
B)worm
C)adware
D)spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
What type of malware is heavily dependent on a user in order to spread?

A)Trojan
B)worm
C)rootkit
D)virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

A)A rootkit
B)A macro
C)A program
D)A process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

A)stealth
B)appender
C)Swiss cheese
D)split
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A macro is a series of instructions that can be grouped together as a single command.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?

A)Phreaking
B)Hacking
C)Social engineering
D)Reverse engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:

A)script
B)virus
C)Trojan
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
How many different Microsoft Windows file types can be infected with a virus?

A)50
B)60
C)70
D)80
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The two types of malware that require user intervention to spread are:

A)Viruses and trojans
B)Rootkits and worms
C)Trojans and worms
D)Rootkits and Trojans
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
A virus that infects an executable program file is known as?

A)macro virus
B)program virus
C)companion virus
D)boot sector virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
_______________ is a general term used to describe software that secretly spies on users by collecting information without their consent.​
​Match the following terms to the appropriate definitions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Software code that gives access to a program or a service that circumvents normal security protections.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A computer virus that is written in a script known as a macro
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A phishing attack that targets only specific users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

A)Adware
B)Keylogger
C)Spam
D)Trojan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?

A)​Dumpster diving
B)​Tailgating
C)​Stalking
D)​Shadowing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
​What type of system security malware allows for access to a computer, program, or service without authorization?

A)​Botnet
B)​Zombie
C)​Backdoor
D)​Command and Control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?

A)Trojan horse
B)virus
C)bug
D)Easter egg
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
Computer code that lies dormant until it is triggered by a specific logical event​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
​A phishing attack that uses telephone calls instead of e-mails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
A false warning designed to trick users into changing security settings on their computer​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match the following terms to the appropriate definitions.
a. Adware
b. Backdoor
c. Botnet
d. Computer virus
e. Hoax
f. Keylogger
g. Logic bomb
h. Macro virus
i. Spear phishing
j. Vishing
A logical computer network of zombies under the control of an attacker.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​

A)​Lockware
B)​Ransomware
C)​Stealware
D)​Hostageware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is a worm?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Due to the prevalence of text filters for filtering spam, how have spammers modified their attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are some of the functions performed by viruses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are botnets?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Explain how an appender infection works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is a backdoor and what is it used for?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe adware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
How does a rootkit work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is malware?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe a macro virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.