Define A+ Security Threats and Vulnerabilities Terms Flashcards

Study and Define A+ Security Threats and Vulnerabilities Terms with these Flashcards. Learn about different terms, keywords, and much more with our flashcards made for students studying for A+ Security Threats and Vulnerabilities Terms with these flashcard quizzes.

25 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Malware
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
A computer program containing malicious segment that attaches itself to an application or other executable component is called:
Virus
A standalone malicious computer program that replicates itself over a computer network is known as:
Worm
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is called:
Trojan Horse
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
What refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Backdoor
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as
Ransomware
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:
Phishing
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of:
  • Phishing
  • Social engineering
Phishing scams targeting a specific group of users are referred to as:
Spear Phishing
An email sent from knunown source disguised as a source known to the message receiver is an example of:
  • Spoofing
  • Social engineering
What refers to a network protocol used in the most common types of spoofing attacks?
SMTP
The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:
Social engineering
What falls into the category of social engineering attacks?
  • Spear phishing
  • Shoulder surfing
  • Tailgating