ethical hacking chapt3

What is adware?
Software that displays unwanted advertisements and may track user activity.

What is an attack?
Any attempt to gain unauthorized access, disrupt, or harm a system or network.

What is a backdoor?
A hidden entry point in software that allows unauthorized access to a system.

What is a botnet?
A network of compromised computers (zombies) controlled remotely to perform malicious activities.

What is a buffer overflow attack?
An attack that exploits programming flaws by overflowing a memory buffer, potentially allowing an attacker to execute malicious code.

What is computer security?
The practice of protecting systems, networks, and data from cyber threats.

What is a denial-of-service (DoS) attack?
An attack that floods a system with traffic, making it unavailable to legitimate users.

What is a distributed denial-of-service (DDoS) attack?
A DoS attack performed using multiple compromised computers (botnet) to amplify the attack.

What is an exploit?
A piece of code or technique used to take advantage of a vulnerability in a system.

What are keyloggers?
Malware that records keystrokes to steal sensitive information, such as passwords.

What is a macro virus?
A virus that infects documents and spreads through macros in programs like Microsoft Word or Excel.

What is malware?
Malicious software designed to harm, exploit, or disable computers and networks.

What is network security?
The practice of protecting networks from unauthorized access, attacks, and vulnerabilities.

What is a Ping of Death attack?
A type of DoS attack that sends oversized or malformed packets to crash a system.

What is ransomware?
Malware that encrypts files and demands payment (ransom) to restore access.

What is a rootkit?
A stealthy type of malware that hides deep in the system to maintain persistent access.

What is a shell?
A command-line interface that allows users to interact with an operating system.

What is spyware?
Malware that secretly gathers information about a user and sends it to a third party.

What is a Trojan program?
Malware that disguises itself as legitimate software but performs malicious activities once executed.

What is a virus?
A malicious program that replicates itself and spreads by attaching to files or software.

What is a virus signature file?
A database of known virus patterns used by antivirus software to detect threats.

What is a vulnerability?
A security flaw or weakness that attackers can exploit to gain unauthorized access.

What is whitelisting?
A security measure that allows only approved applications or users to access a system.

What is a worm?
A self-replicating malware that spreads across networks without user interaction.

What are zombies?
Infected computers in a botnet that execute commands from an attacker without the owner's knowledge.

robot