Front | Back |
![]() Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as: |
Malware
|
![]() Malicious software collecting information about users without their knowledge/consent is known as: |
Spyware
|
![]() A computer program containing malicious segment that attaches itself to an application program or other executable component is called: |
Virus
|
![]() A standalone malicious computer program that replicates itself over a computer network is known as: |
Worm
|
![]() Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is called: |
Trojan horse
|
![]() A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as: |
Rootkit
|
![]() Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system? |
Backdoor
|
![]() Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as |
Ransomware
|
![]() A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as: |
Phishing
|
![]() A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of |
Phishing Social engineering
|
![]() Phishing scams targeting a specific group of users are referred to as: |
Spear phishing
|
![]() An email sent from unknown source disguised as a source known to the message receiver is an example of |
Spoofing Social engineering
|
![]() Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks? |
SMTP
|
![]() The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as: |
Social engineering
|
![]() Which of the following fall(s) into the category of social engineering attacks? |
Spear phishing Tailgating Shoulder Surfing
|