2. A hacker who goes through the garbage looking for information is engaging in _______________. … What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?
Phishing
. 7.
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program group of answer choices?
Term What is it called when a user accesses resources in an unauthorized way? Definition Unauthorized Access | Term What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program. Definition Virus |
---|
What is it called when a hacker goes through the garbage looking for information Group of answer choices dumpster diving infiltration garbage scan wastebasket diving?
Dumpster diving, also called “
trashing
,” is a method of information gathering in which an attacker searches through on-site trash cans and dumpsters to gather information about the target organization.
What malware term best describes when a hacker takes over your computer to make it do things for the hacker without your knowledge?
15.
Spyware
. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
What is a complete program that travels from machine to machine through computer networks?
A computer worm
is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
Which type of reconnaissance is dumpster diving?
Figure 5-1 illustrates the process of unearthing this information.
Passive reconnaissance
, as the figure shows, involves obtaining information from user group meetings, websites, Edgars’ database, UUNet newsgroups, business partners, dumpster diving, and social engineering.
Which type of hacker represents highest risk to your network?
- Black-hat hackers.
- Grey-hat hackers.
- Script kiddies.
- Disgruntled employees.
Which of the following is an example of spyware?
Spyware is mostly classified into four types: adware, system monitors, tracking including
web tracking
, and trojans; examples of other notorious types include digital rights management capabilities that “phone home”, keyloggers, rootkits, and web beacons.
Which of the following is malicious software?
What is Malware? Malware is a catch-all term for various malicious software, including
viruses, adware, spyware, browser hijacking software
, and fake security software. Once installed on your computer, these programs can seriously affect your privacy and your computer’s security.
What is virus in information security?
In more technical terms, a computer virus is
a type of malicious code or program written to alter the way a computer operates
and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
What can a hacker do with malware?
Computer hackers are unauthorized users who
break into computer systems in order to steal, change or destroy information
, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them access the information you really don’t want them to have.
Which malicious program Cannot do anything?
Answer is “
Virus
“
Is malware a virus?
viruses is an important one. Malware is a
catch-all term for any type of malicious software
, regardless of how it works, its intent, or how it’s distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs.
What are the 4 types of networks?
- LAN(Local Area Network)
- PAN(Personal Area Network)
- MAN(Metropolitan Area Network)
- WAN(Wide Area Network)
Which of the following should Mary set up on her Wi Fi router to make it the most secure?
Which of the following should Mary set up on her Wi-Fi router to make it the most secure? D.
Mary should set up WPA2
on her Wi-Fi router.
What is the biggest advantage of networking?
Files can easily be shared between users
. Network users can communicate by email and instant messenger . Security is good – users cannot see other users’ files unlike on stand-alone machines. Data is easy to backup as all the data is stored on the file server .