longquiz

    Cards (69)

    • What does malicious code include?
      Viruses, worms, Trojan horses, and bots
    • What is drive-by downloads malware?

      Malware that comes with a downloaded file
    • How do viruses spread?

      By replicating and copying themselves
    • What is the primary function of worms malware?

      To spread from computer to computer
    • What does ransomware do?

      Prevents access to files and demands payment
    • What are Trojan horses?

      Benign programs that act unexpectedly
    • What is a backdoor in malware?

      Access point for attackers in compromised systems
    • What is a bot in terms of malicious code?

      A type of code covertly installed online
    • What is a botnet?

      A collection of captured bot computers
    • At what levels is malicious code a threat?
      Both client and server levels
    • What are potentially unwanted programs (PUPs)?
      Programs that install themselves on computers
    • What does adware do?
      Serves pop-up ads to users
    • What are browser parasites?
      Programs that monitor and change browser settings
    • What is spyware used for?
      To obtain user information like keystrokes
    • What is phishing?
      Deceptive attempts to obtain confidential information
    • What is social engineering?
      Exploitation of human gullibility to distribute malware
    • Who are hackers?
      Individuals seeking unauthorized access to systems
    • What do crackers denote?
      Hackers with criminal intent
    • What is hacktivism?
      Cybervandalism for political purposes
    • What are white hats?
      Good hackers who fix security flaws
    • What are black hats?
      Hackers who intend to cause harm
    • What are grey hats?
      Hackers pursuing a greater good by revealing flaws
    • What is cybervandalism?
      Intentionally disrupting or destroying a site
    • What is a data breach?
      Loss of control over information to outsiders
    • What is credit card fraud?
      Theft of credit card data online
    • What is identity fraud?
      Unauthorized use of another person's data
    • What is spoofing?
      Hiding true identity using someone else's information
    • What is pharming?
      Automatically redirecting a web link to a different address
    • What is spam?
      Advertisements disguised as offers
    • What is a Denial of Service (DOS) attack?
      Flooding a website with useless traffic
    • What is a Distributed Denial of Service (DDOS) attack?
      Using multiple computers to attack a network
    • What is a sniffer?
      An eavesdropping program monitoring network information
    • What are email wiretaps?
      Methods for recording email traffic
    • What is security?
      Quality of being free from danger
    • What are the multiple layers of security an organization should have?
      • Physical security
      • Personnel security
      • Operations security
      • Communications security
      • Network security
      • Information security
    • What is encryption?
      Transforming plain text into cipher text
    • What is a key (cipher)?
      Method for transforming plain text to cipher text
    • What is a substitution cipher?
      Replacing letters systematically with others
    • What is a transposition cipher?
      Changing the order of letters systematically
    • What is symmetric key encryption?
      Same key used for encryption and decryption
    See similar decks