1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called:
Ransomware
A Trojan horse is a type of software that performs harmful actions under the guise of a legitimate and useful program. The most characteristic feature of Trojan horse is that while it may function as a legitimate program and possess all the expected functionalities, it also contains a concealed portion of malicious code that the user is unaware of.
True
Which type of Trojan enables unauthorized remote access to a compromised system?
RAT
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is referred to as:
Worm
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
Which of the answers listed below refer to the characteristic features of bloatware? (Select 3 answers)
Pre-installed on a device by the device manufacturer or retailer
Installed without user consent
Generally considered undesirable due to negative impact on system performance
Which of the following answers refer to the characteristics of a PUP? (Select 3 answers)
Often installed without clear user consent
Can be pre-installed, downloaded, or bundled with other software
Generally considered undesirable due to negative impact on system performance, privacy, and security
Which of the statements listed below apply to the definition of a computer virus?
A self-replicating computer program containing malicious segment
Malware that typically requires its host application to be run to make the virus active
Malicious code that typically attaches itself to an application program or other executable component
Which of the following is an example of spyware?
Keylogger
Malicious code activated by a specific event is called:
Logic bomb
Which of the following answers refers to a collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network?
Rootkit