Malware

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a PUP? (Select 3 answers)

- A type of computer program not explicitly classified as malware by AV software. - A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads. - An application downloaded and installed with the user's consent (legal app)

Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

Backdoor

A malware-infected network host under remote control of a hacker is commonly referred to as:

Bot

Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?

Botnet

What is the function of a C2 server?

Botnet control

Which type of malware resides only in RAM?

Fileless virus

Which of the following is an example of spyware?

Keylogger

Malicious code activated by a specific event is called:

Logic bomb

Which type of Trojan enables unauthorized remote access to a compromised system?

RAT

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Ransomware

Which of the following is an example of cryptomalware?

Ransomware

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit

Malicious software collecting information about users without their knowledge/consent is known as:

Spyware

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

True

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

Worm


Ensembles d'études connexes

Chapter 9 - Teaching and Counseling

View Set

Chapter 30 Formation and Internal Relations of General Partnerships

View Set

Stability & Range of Motion Practice

View Set