Comptia A+ 902 Security Threats and Vulnerabilities!

25 cards   |   Total Attempts: 182
  

Cards In This Set

Front Back
Question 1
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Malware
Question 2
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
Question 3
A computer program containing malicious segment that attaches itself to an application program or other executable component is called:
Virus
Question 4
A standalone malicious computer program that replicates itself over a computer network is known as:
Worm
Question 5
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is called:
Trojan horse
Question 6
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Question 7
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Backdoor
Question 8
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as
Ransomware
Question 9
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:
Phishing
Question 10
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of
Phishing Social engineering
Question 11
Phishing scams targeting a specific group of users are referred to as:
Spear phishing
Question 12
An email sent from unknown source disguised as a source known to the message receiver is an example of
Spoofing Social engineering
Question 13
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?
SMTP
Question 14
The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:
Social engineering
Question 15
Which of the following fall(s) into the category of social engineering attacks?
Spear phishing Tailgating Shoulder Surfing