Matching
Match each item with a statement below:
Premises:
executable program advertised as performing one activity, but actually does something else
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
general term that refers to a wide variety of damaging or annoying software programs
series of instructions that can be grouped together as a single command
uses graphical images of text in order to circumvent text-based filters
adds a program to the operating system that is a malicious copycat version to a legitimate program
general term used to describe software that violates a user's personal security
hides or removes traces of log-in records, log entries, and related processes
false warning, often contained in an e-mail message claiming to come from the IT department
Responses:
Trojan
Rootkit
Spyware
Image spam
Hoax
Worm
Malware
Companion virus
Macro virus
Correct Answer:
Premises:
Responses:
executable program advertised as performing one activity, but actually does something else
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
general term that refers to a wide variety of damaging or annoying software programs
series of instructions that can be grouped together as a single command
uses graphical images of text in order to circumvent text-based filters
adds a program to the operating system that is a malicious copycat version to a legitimate program
general term used to describe software that violates a user's personal security
hides or removes traces of log-in records, log entries, and related processes
false warning, often contained in an e-mail message claiming to come from the IT department
Premises:
executable program advertised as performing one activity, but actually does something else
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
general term that refers to a wide variety of damaging or annoying software programs
series of instructions that can be grouped together as a single command
uses graphical images of text in order to circumvent text-based filters
adds a program to the operating system that is a malicious copycat version to a legitimate program
general term used to describe software that violates a user's personal security
hides or removes traces of log-in records, log entries, and related processes
false warning, often contained in an e-mail message claiming to come from the IT department
Responses:
Related Questions
Q32: A(n) _ refers to an undocumented, yet
Q35: _ is a software program that delivers
Q38: _ uses "speckling" and different colors so
Q39: _ is an image spam that is
Q40: What are some of the costs involved
Q42: How does a rootkit work?
Q45: What is a backdoor and what is
Q48: Explain how an appender infection works.
Q49: Describe adware.
Q50: What are some of the functions performed
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents