A computer program that can copy itself (replicate)
and infect a specific computer without the permission or knowledge of the owner?
Computer Virus
What is the name of Port #23
Telnet
The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information?
Phising
Google estimates 9 out of 10 emails are ____?
Spam
VPN
Virtual Private Network
Malware which consists of a program designed to hide or obscure the fact that a system has been compromised?
Rootkit
What is the name of port#88
Kerberos
A type of phishing that targets wealthy individuals and senior executives of companies?
Whaling
Perpetuated by bots that harvest IM screen names off of the internet and simulate a human user by sending spam to the screen names via Instant Messaging?
SPIM
IPS
Intrusion Prevention System
A type of malware that is installed on computers and collects info about users without their knowledge?
Spyware
What is the name of port#110
POP3
The same thing as phishing but the attacker uses a phone instead?
Vishing
The act of an unauthorized person who follows someone to a restricted area without the consent of a authorized person?
Tailgating
IDS
Intrusion Detection System
An attacker masquerades as a real or fake character and plays that role to a victim to take advantage of them?
Impersonation
What port is HTTP?
80
Attackers sort through garbage to gain information used for attacks?
Dumpster Diving
Refers to using direct observation techniques, such as looking over someone's shoulder to get information?
Shoulder Surfing
SKL
Simple Key Loader
A piece of code intentionally inserted into a software system that will set off a malicious function or delete data when specified conditions are met.
Logic Bomb
What port is HTTPS?
443
An attack aiming to redirect a website's traffic to another website?
Pharming
When an employee conspires with an unauthorized person to allow them to walk in with them through the door?
Piggybacking
OSI Model
Open Systems Interconnection Model