Malware Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called:

Ransomware

2
New cards

A Trojan horse is a type of software that performs harmful actions under the guise of a legitimate and useful program. The most characteristic feature of Trojan horse is that while it may function as a legitimate program and possess all the expected functionalities, it also contains a concealed portion of malicious code that the user is unaware of.

True

3
New cards

Which type of Trojan enables unauthorized remote access to a compromised system?

RAT

4
New cards

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is referred to as:

Worm

5
New cards

Malicious software collecting information about users without their knowledge/consent is known as:

Spyware

6
New cards

Which of the answers listed below refer to the characteristic features of bloatware? (Select 3 answers)

  • Pre-installed on a device by the device manufacturer or retailer

  • Installed without user consent

  • Generally considered undesirable due to negative impact on system performance

7
New cards

Which of the following answers refer to the characteristics of a PUP? (Select 3 answers)

  • Often installed without clear user consent

  • Can be pre-installed, downloaded, or bundled with other software

  • Generally considered undesirable due to negative impact on system performance, privacy, and security

8
New cards

Which of the statements listed below apply to the definition of a computer virus?

  • A self-replicating computer program containing malicious segment

  • Malware that typically requires its host application to be run to make the virus active

  • Malicious code that typically attaches itself to an application program or other executable component

9
New cards

Which of the following is an example of spyware?

Keylogger

10
New cards

Malicious code activated by a specific event is called:

Logic bomb

11
New cards

Which of the following answers refers to a collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network?

Rootkit