Podcast
Questions and Answers
What type of attack is also known as a user-interface (UI) redress attack?
What type of attack is also known as a user-interface (UI) redress attack?
What is the primary purpose of social engineering tactics?
What is the primary purpose of social engineering tactics?
What is the name of the virus that was first seen in 1998 and deletes data on an infected system by overwriting the hard drive with zeroes?
What is the name of the virus that was first seen in 1998 and deletes data on an infected system by overwriting the hard drive with zeroes?
What is the term for unsolicited bulk e-mail that is often used for phishing attacks and malware distribution?
What is the term for unsolicited bulk e-mail that is often used for phishing attacks and malware distribution?
Signup and view all the answers
What is the name of the first mobile phone Trojan that appeared in 2004?
What is the name of the first mobile phone Trojan that appeared in 2004?
Signup and view all the answers
What is the term for a program or utility containing harmful hidden code?
What is the term for a program or utility containing harmful hidden code?
Signup and view all the answers
What is the primary objective of Payload System Corruption (2 of 3) Ransomware?
What is the primary objective of Payload System Corruption (2 of 3) Ransomware?
Signup and view all the answers
What is the term for a collection of bots that can act in a coordinated manner?
What is the term for a collection of bots that can act in a coordinated manner?
Signup and view all the answers
What is the primary goal of Phishing attacks?
What is the primary goal of Phishing attacks?
Signup and view all the answers
What is the term for a secret entry point into a program that allows an attacker to gain access and bypass security access procedures?
What is the term for a secret entry point into a program that allows an attacker to gain access and bypass security access procedures?
Signup and view all the answers
What is the primary goal of Rootkit malware?
What is the primary goal of Rootkit malware?
Signup and view all the answers
What is the ideal solution to the threat of malware?
What is the ideal solution to the threat of malware?
Signup and view all the answers
What is the primary approach of First-generation Anti-Virus Software?
What is the primary approach of First-generation Anti-Virus Software?
Signup and view all the answers
What is the term for malicious code that is set to 'explode' when certain conditions are met?
What is the term for malicious code that is set to 'explode' when certain conditions are met?
Signup and view all the answers
What is the primary goal of Perimeter Scanning Approaches?
What is the primary goal of Perimeter Scanning Approaches?
Signup and view all the answers
What is the term for software that monitors program behavior in real-time for malicious action?
What is the term for software that monitors program behavior in real-time for malicious action?
Signup and view all the answers
What is malware, according to NIST definition?
What is malware, according to NIST definition?
Signup and view all the answers
What is the primary difference between a virus and a worm?
What is the primary difference between a virus and a worm?
Signup and view all the answers
What is the term for a malicious attack that involves a wide variety of intrusion technologies and malware?
What is the term for a malicious attack that involves a wide variety of intrusion technologies and malware?
Signup and view all the answers
What is the purpose of a trigger event in a virus?
What is the purpose of a trigger event in a virus?
Signup and view all the answers
What is the name of the first known worm infection?
What is the name of the first known worm infection?
Signup and view all the answers
What is the term for a program that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
What is the term for a program that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
Signup and view all the answers
What is the primary way that malware spreads through shared media?
What is the primary way that malware spreads through shared media?
Signup and view all the answers
What is the term for a malicious attack that involves compromising websites and then waiting for targeted victims to visit them?
What is the term for a malicious attack that involves compromising websites and then waiting for targeted victims to visit them?
Signup and view all the answers
What is the term for a type of malware that encrypts files and demands a ransom payment to recover them?
What is the term for a type of malware that encrypts files and demands a ransom payment to recover them?
Signup and view all the answers
What is the term for a type of malware that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?
What is the term for a type of malware that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?
Signup and view all the answers