Which of the following is malicious computer code that reproduces itself on the same computer a virus B worm C spyware D adware?

Show

What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?A) PhreakingB)HackingC)Social engineeringD)Reverse engineering

Social engineering

The two types of malware that require user inervention to spread are:A) Viruses and trojansB) Rootkits and wormsC) Trojans and wormsD) Worms and viruses

Viruses and trojans

Which of the following is malicious computer code that reproduces itself on the same computer?A) virusB) wormC) adwareD) spyware

virus

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?A) stealthB) appenderC) Swiss cheeseD) split

Swiss cheese

What type of malware is heavily dependent on a user in order to spread?A) TrojanB) wormC) rootkitD) virus

virus

A virus that infects an executable program file is known as?A) macro virusB) program virusC) companion virusD) boot sector virus

program virus

How many different Microsoft Windows file types can be infected with a virus?A) 50B) 60C) 70D) 80

70

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:A) A rootkitB) A macroC) A programD) A process

A macro

Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:A) scriptB) virusC) TrojanD) worm

Trojan

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?A) rootkitB) backdoorC) wrapperD) shield

A) rootkit

Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?A) TrojanB) logic bombC) macro virusD) metamorphic virus

logic bomb

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?A) Trojan horseB) virusC) bugD) Easter egg

Easter egg

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?A) AdwareB) KeyloggerC) SpamD) Trojan

Adware

What is the term used to describe unsolicited messages received on instant messaging software?A) ​Spam​B) Spim​C) SplatD) Crust

​Spim

Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?A) Oligomorphic malwareB) Polymorphic malwareC) Metamorphic malwareD) Statimorphic malware

Oligomorphic malware

Which of the following is not one of the four methods for classifying the various types of malware?​A) ​CirculationB) ​InfectionC) ​ConcealmentD) ​Source

​Source

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​A) ​Spam​B) AdwareC) ​Watering HoleD) ​Typo Squatting

​Watering Hole

The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?A) ​Dumpster divingB) ​TailgatingC) ​StalkingD) ​Shadowing

​Tailgating

​What type of system security malware allows for access to a computer, program, or service without authorization?​A) BotnetB) ​ZombieC) ​BackdoorD) ​Command and Control

​Backdoor

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​A) ​LockwareB) ​RansomwareC) ​StealwareD) ​Hostageware

Ransomware

What is a malicious computer code that reproduces itself on the same computer?

keylogger. A phishing attack that targets only specific users. spear fishing. Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.​

Which of the following is malicious computer program code?

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.

Is spyware a virus?

Note: Be aware that spyware is different from viruses. While both are types of malware that hide within your device, viruses are designed to replicate and embed into your other device files. Spyware does not have this replication trait. Therefore, terms like “spy virus” are not accurate.

Is worm a malware?

A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. A computer worm duplicates itself to spread to uninfected computers.