Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
What type of system security malware allows for access to a computer, program, or service without authorization?
|
Backdoor
|
|
A macro virus takes advantage of the “____________________” relationship between the application and the operating system.
|
Trust
|
|
What is the term used to describe unsolicited messages received on instant messaging software?
|
Spim
|
|
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
|
False
|
|
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
|
Adware
|
|
A virus that infects an executable program file is known as?
|
Program
|
|
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
|
Watering Hole
|
|
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
|
Easter Egg
|
|
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
|
Rootkit
|
|
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?
|
Oligormorphic malware
|