Front | Back |
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
|
Malware
|
Malicious software collecting information about users without their knowledge/consent is known as:
|
Spyware
|
A computer program containing malicious segment that attaches itself to an application or other executable component is called:
|
Virus
|
A standalone malicious computer program that replicates itself over a computer network is known as:
|
Worm
|
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is called:
|
Trojan Horse
|
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
|
Rootkit
|
What refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
|
Backdoor
|
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as
|
Ransomware
|
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:
|
Phishing
|
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of:
|
|
Phishing scams targeting a specific group of users are referred to as:
|
Spear Phishing
|
An email sent from knunown source disguised as a source known to the message receiver is an example of:
|
|
What refers to a network protocol used in the most common types of spoofing attacks?
|
SMTP
|
The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:
|
Social engineering
|
What falls into the category of social engineering attacks?
|
|