what type of malware encrypts files and demands payment to unlock them?
Ransomware
Keyloggers are designed to:
record keystrokes to steal passwords.
spear phishing is:
targeted phishing at specific people
watering hole attacks:
infect commonly visited websites to target users
blue and red make:
purple
Which malware pretends to be legitimate software but secretly harms your system?
Trojan
Adware is a type of malware that:
Displays unwanted ads.
whaling attacks target:
executives or high-value targets
Rogue software installed by a user unknowingly is often called:
Trojan
name the colors in the rainbow in order
red, orange, yellow, green, blue, indigo, violet
malware that spreads across networks automatically without user action is called a:
worm
Rootkits are dangerous because they:
Hide malware deep in the system.
Vishing refers to:
phishing via phone
Logic bombs are:
malware triggered by a specific event or date
the more you take away the bigger I get. what am I?
a hole
Malware that attaches to files and requires the user to open them is called a:
virus
what is zero-day exploit:
exploit targeting a flaw before a patch is available.
Pharming attacks
redirect users to fake websites without their knowledge
Botnets are:
Networks of infected devices controlled remotely
if a rooster laid an egg on a triangular roof which way would it roll left or right?
Roosters don't lay eggs....
Spyware is used to:
monitor and steal user information.
phishing is an example of:
Social Engineering
tailgating is a physical security threat where:
someone follows an authorized person into a building
Social engineering attacks primarily exploit:
Human trust and behavior
what came first the egg or the chicken
the egg (duh)