chapter 5 -2
Describe what Ransomware is.
attacks a computer and limits the user's ability to access the computer
List some malware prevention strategies.
frequent media scans, multiple anti-malware software shields, and frequent signatures database updates
1. Describe what Trojan horse virus is.
is a malware that either hides or masquerades as a useful or benign program
What is the difference between a Quick malware scan and a full scan?
quick scans generally only scan files that are likely to contain malware such as executable files. Quick scans can reduce the negative performance impact on computers. Ensure full scans occur periodically
What would you do to ensure you clean all rootkits off your system?
run windows 10 defender offline scan from inside windows 10
Describe what a virus is
software program that attaches itself to or copies itself into another program
When scanning for malware what is meant by the shield function?
software that intercepts all incoming and optionally outgoing information scanning each message or file for malware content
When is the best time to run antivirus scans?
the best time to run a scan is once per week
What is a resource to use when developing a malware eradication plan?
your anti-malware software support resources and Microsoft online resources
What is the difference between a virus and a worm?
A virus attaches to or infects a host program and a worm stands alone program does not need a host
1. Describe what a zero-day attack is.
A zero-day attack is a malware that is actively exploiting an unknown vulnerability
Describe what a Buffer overflows is.
Is a condition in which a running program stores data in an area outside the memory location set aside for the data
What are some common types of malware?
Trojan horses, ransomware, rootkits, and spyware, viruses, and worms
1. Describe what worm virus is.
is a type of malware that is self-contained it is a program the replicates and sends copies of itself to another computer generally across a network
Describe what cryptomining is.
is the process in which transactions for various forms of cryptocurrency are vertified and added to the blockchain digital ledger
Describe what Cryptojacking is.
is using the victims computing power to mine cryptocurrency
1. Describe what Heuristic scanning is.
it compares observed behavior with stored malware behavior
Why is it a bad idea to disable your anti-malware application?
it is a bad idea because your device will be unprotected against malware and virus that can affect your device
How does a Rootkit work?
it modifies or replaces one or more existing programs to hide the fact that a computer has been compromised