Malware
Phishing
Prevention
Encryption
Misc
100
This type of malware does not require a host file to run; it self-replicates
What is a Worm
100
an attack, usually in email form, which tries to trick the user into providing personal information.
What is phishing
100
The most useful form of security issue prevention. Should involve all users.
What is User Education
100
This encryption tool allows individual files or folders to be encrypted in Windows.
What is Encrypting File System
100
A macro virus takes advantage of the “____________________” relationship between the application and the operating system.
What is Trust
200
This type of malware takes administrative access away from the user, and takes complete control of the computer.
What is a rootkit
200
a more specialized form of phishing.
What is spear phishing
200
The standard school of thought in security is to grant the least permission required to any user
What is principle of least privilege
200
This Microsoft tool allows an entire drive or partition to be encrypted
What is bitlocker
200
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer’s keyboard.
What is Keylogger
300
This software is designed to track a user and obtain as much personal info as possible.
What is spyware
300
unsolicited email
What is spam
300
You should always do this when you walk away from your computer.
What is lock your computer
300
This type of encryption makes the data unreadable, and is not un-encryptable
What is hashing
300
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
What is a Macro
400
Malicious code which attaches itself to a host file and attempts to spread itself.
What is a virus
400
Software which appears to be attempting to remove a virus or malware, but is in fact trying to get money or personal information
What is Rogueware
400
When you log into a device, this provides authentication for all other devices on the network.
What is single sign on
400
This is the primary encryption method used for web pages
What is SSL/TLS
400
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?
What is logic bomb
500
Groups of computers working together for some nefarious means. Typically, the owners of the computers do not know they are being used.
What are botnets
500
Code that appears to be something desired or useful, but actually runs malicious code
What is a trojan horse
500
This is the term used to describe a personal attack in which the perpetrator uses a weakness in human psychology to gain information.
What is social engineering
500
This is the port used for SSL Connections
What is 443
500
What is the term used to describe unsolicited messages received on instant messaging software?
What is spim
M
e
n
u