Malicious software collecting information about users without their knowledge/consent is known as:

Here are some basic definitions for malicious content found in emails and web pages/sites.

Adware: As defined by Wikipedia: “Adware, or advertising-supported software, is any software package that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. The term is sometimes used to refer to software that displays unwanted advertisements known as malware.”

Malware: As defined by Wikipedia. “Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.”

Phishing: As defined by the Searchsecurity.techtarget.com web site. “Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels. Typically a victim receives a message that appears to have been sent by a known contact or organization. An attachment or links in the message may install malware on the user’s device or direct them to a malicious website set up to trick them into divulging personal and financial information, such as passwords, account IDs or credit card details. Phishing is a homophone of fishing, which involves using lures to catch fish.”

Spyware: As defined by Wikipedia: “Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent, or that asserts control over a computer without the consumer’s knowledge. This includes Trojans, which is defined separately below.”

Trojan (horse) virus: As defined by Webopedia. “One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering.”

Viruses: As defined by Wikipedia: “A computer virus is a type of malicious software program (“malware”) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Infecting computer programs can include as well, data files, or the “boot” sector of the hard drive. When this replication succeeds, the affected areas are then said to be “infected” with a computer virus.”

Macro Virus: These type of virus infects word, excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.

Master boot record files: MBR viruses are memory-resident viruses and copy itself to the first sector of a storage device which is used for partition tables or OS loading programs .A MBR virus will infect this particular area of Storage device instead of normal files. The easiest way to remove a MBR virus is to clean the MBR area,

Boot sector virus: Boot sector virus infects the boot sector of a HDD or FDD. These are also memory resident in nature. As soon as the computer starts it gets infected from the boot sector.  Cleaning this type of virus is very difficult.

Multipartite virus: A hybrid of Boot and Program/file viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.

Stealth viruses: These types of viruses use different kind of techniques to avoid detection. They either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For example, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

Which of the following statements apply to the definition of a computer virus?
A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
A standalone malicious computer program that replicates itself over a computer network
Can run by itself without any interaction
Attaches itself to an application program or other executable component
A self-contained malicious program or code that does need a host to propagate itself

A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
Attaches itself to an application program or other executable

Which of the terms listed below refers to an example of a crypto-malware?
Backdoor
Ransomware
Keylogger
Rootkit

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

A type of software that performs unwanted and harmful actions in disguise of legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. (True or False)

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Which of the following answers lists an example of spyware?
Keylogger
Vulnerability scanner
Computer worm
Packet Sniffer

Software that displays advertisements

Malicious software collecting information about users without their knowledge/consent is known as:

A malware-infected networked host under remote control of a hacker is commonly referred to as:

Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Honeynet
Botnet
Quarantine network
Malware

Which type of Trojan enables unauthorized remote access to a compromised system?

Malicious code activated by a specific event is called:

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of:

Phishing
Social Engineering

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:

Phishing scams targeting a specific group of people are referred to as:

Phishing scams targeting people holding high positions in an organization of business are known as

The practice of using a telephone system to manipulate user into disclosing confidential information is called:

Gaining unauthorized access to restricted areas by following another person

Which social engineering attack relies on identity theft?

In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the compnay and other data can be used to facilitate social engineering attacks. Having documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks. (True or False)

A situation in which an unauthorized person can view another user's display or keyboard to learn their password or other confidential information is referred to as:

What is malicious software called?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.

What are three types of malicious software?

These are the most common types of malware to recognize: Malware viruses. Worm malware. Trojan malware.

What is spyware and adware?

Spyware are programs designed to track all of your computer activities, from which applications you use to which websites you visit. Adware are programs that pop-up various advertisements and offers, often based on the websites you visit.

What are the two types of malicious code?

Types of malicious code.
Viruses. Viruses are self-replicating malicious code that attaches to macro-enabled programs to execute. ... .
Worms. ... .
Trojans. ... .
Cross-site scripting (XSS) ... .
Backdoor attacks. ... .
Emotet trojan. ... .
Stuxnet worm..