CompTIA Security+ (SY0-601) Bootcamp - Your preparation for the world's best cybersecurity certification!

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is grayware?

Grayware is a broad category of software that may cause annoying or undesirable effects on a computer, like pop-up ads or changing mouse behavior, but is not overtly malicious like a virus or trojan.

What is ransomware?

Ransomware is a type of malware that encrypts a victim's files or locks them out of their computer, demanding a ransom payment for the decryption key or to regain access.

Why are backups important in the context of ransomware?

Regular and secure backups are crucial because they allow you to restore your data without paying the ransom if you become a victim of ransomware.

What is SPIM?

SPIM, or Spam over Instant Messaging, is the equivalent of email spam, but it occurs over instant messaging platforms, including text messages, chat apps, and game chats, sending unsolicited messages to users.

What are the dangers of spam?

While often just annoying advertisements, spam can be dangerous, potentially containing malware or phishing attempts that can lead to security breaches and personal information theft.

What impact do worms have on computer systems?

Worms consume computing resources such as processing power, memory, and network bandwidth, which can slow down systems and potentially cause crashes due to the rapid replication and spreading.

How do worms replicate and spread across networks?

Worms exploit security vulnerabilities to spread automatically from machine to machine without needing user actions like opening a file or installing a program.

What is a Remote Access Trojan (RAT)?

A RAT is a specific type of Trojan that allows an attacker to control a victim's computer remotely. It can perform various actions like accessing files, controlling hardware, and manipulating system settings.

What is a boot sector virus?

A boot sector virus is stored in the first sector of a hard drive and loads into memory on computer startup, making it difficult to detect with standard antivirus software.

What is a computer worm?

A computer worm is a type of malicious software that can replicate itself and spread throughout a network without any user interaction, exploiting security holes in operating systems and applications.

What is a hoax virus?

A hoax virus tricks users into infecting their own machines through social engineering, like fake tech support calls or misleading pop-ups.

What is a keylogger?

A keylogger is a type of spyware that records the keys struck on a keyboard, usually covertly, allowing the individual who installed the keylogger to monitor the user's typed information, such as passwords and other sensitive data.

What is a macro virus?

A macro virus is embedded in a document and executes when the document is opened. It's commonly found in Word, Excel, or PowerPoint files.

What is a metamorphic virus?

A metamorphic virus can rewrite its own code entirely before infecting a file, being an advanced form of a polymorphic virus.

What is a multipartite virus?

A multipartite virus is a hybrid of boot sector and program viruses, ensuring persistence by reinstalling itself upon each system startup.

What is a polymorphic virus?

A polymorphic virus alters its code each time it executes by changing the decryption module, evading signature-based detection.

What is a program virus?

A program virus infects executable or application files, such as Microsoft Word, causing the virus to load each time the program is opened.

How does a computer virus spread?

A virus can spread when a user takes an action, like installing a program which contains the virus, allowing it to replicate and spread across a network.

What is adware?

Adware is a form of spyware that displays targeted advertising to a user based on their browsing habits and personal information collected without the user's consent.

What is an armored virus?

An armored virus has protective layers to confuse analysis, increasing its chances of spreading without detection.

What is an encrypted virus?

An encrypted virus uses a cipher to conceal its contents, making it harder for antivirus software to detect it.

What is an open mail relay and why is it a problem?

An open mail relay is a mail server configured to allow anyone on the internet to send email through it, which can be exploited by spammers to send bulk emails, potentially implicating the server owner in spam activities.

Why should one be cautious when downloading programs from the internet?

Downloaded programs can contain hidden malicious code, including viruses, worms, and Trojans, that can compromise system security. It's important to verify and scan all downloads before installation.

Should victims pay the ransom demanded by ransomware?

Experts generally advise against paying the ransom, as it does not assure getting the decryption key, and it can further encourage the attackers.

What happened during the SamSam ransomware attack on the City of Atlanta?

In 2018, Atlanta's municipal systems were hit by the SamSam ransomware, which resulted in around $17 million in recovery costs, including services, software, and hardware upgrades, even though they did not pay the ransom.

What is a Trojan horse in computer terms?

In computing, a Trojan horse is a type of malware that is disguised as legitimate software. It performs a desired function but also conducts malicious activities without the user's knowledge.

What is spam?

Spam refers to unsolicited, often irrelevant or inappropriate messages sent over the internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading malware, etc.

What functions does spyware typically perform?

Spyware can track personal information, monitor online activities, harvest keystrokes, and even take screenshots, all of which can be relayed to third parties.

What is spyware?

Spyware is a type of malware that covertly collects information about a user and their computer behavior without their knowledge, often leading to privacy breaches.

What is a stealth virus?

Stealth viruses use various techniques, like encryption or polymorphism, to avoid detection by antivirus software.

What is the CAN-SPAM Act of 2003?

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

What was the Conficker worm, and why was it significant?

The Conficker worm, emerging in 2009, was one of the largest worms, infecting an estimated 9 to 15 million machines by exploiting a vulnerability in Windows OS related to file and printer sharing (specifically the Microsoft 08-067 patch).

What was significant about the Nimda worm?

The Nimda worm, which appeared in 2001, was notable for its rapid propagation, spreading across the entire Internet in just 22 minutes.

What are the most common forms of spam?

The most common forms of spam include email spam, text message spam, social media spam, and instant messaging spam, with email being the most prevalent.

What is the historical origin of the term "Trojan Horse"?

The term originates from an ancient strategy used by the Greeks during the war with Troy, where they presented a large wooden horse as a peace offering, which secretly contained soldiers inside to open the city gates for the Greek army.

How do Trojans function?

Trojans promise to perform a certain function for the user but simultaneously carry out hidden harmful actions, such as creating backdoors for remote access or stealing data.

What can happen if your computer is infected with ransomware?

You may lose access to your system or files, and a message will typically demand a ransom payment, often through cryptocurrency, to restore access. Paying the ransom does not guarantee recovery of the files.


Conjuntos de estudio relacionados

PATHO Chapter 12 HIV disease and AIDS

View Set

Intro. Health Information Management: Chapter 10

View Set

Real Estate Law Chapter 17 (TAXES)

View Set

Unit 18 Position, Strategies, and Trade Authority SIE

View Set

Muscles of Inspiration - Origin, Insertion, and Action

View Set

MATH 1211 - Calculus - Study for Exam

View Set