Module 7: Section B Malware

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

rootkit

Any code that is designed to hide the existence of processes and privileges

___ are a type of standalone malware that masquerades as useful utilities or applications, which victims download and install unaware of their destructive nature.

Trojans

Computer viruses are characterized by their ___________

ability to self-replicate

side-loading

an app from a source other than an official app store is installed on a device

A rootkit _____________.

disabling antivirus software

In the context of malware, a trojan's main purpose is to ________

disguise malware as legitimate software

Malware trojans often contain code that is called a ______, which secretly installs malware

dropper

Antivirus software can detect viruses by looking for signatures can detect viruses by looking for signatures or by _______ analysis

heuristic

A virus ___ usually arrives as an email alert that warms against an imminent virus attack

hoax

trojan

is a computer program that seems to perform one function while actually doing something else

computer virus

is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device

computer worm

is a small self-replicating, self-distributing program designed to carry out unauthorized activity on a victims device

Antivirus software

is a type of utitlity software that looks for and eliminates viruses, trojans, worms, and other malware.

Dropper

is designed to deliver or "drop" malicious code into a device

dropper

is designed to deliver or "drop" malicious code into a device

Code injection

is the process of modifying an executable file or data stream by adding additional commands

Through a process called side- ________, an app from a source other than an official app store is installed on device

loading

The action carried out by malware code is referred to as a(n) ____ or payload

malware exploit

Antivirus software produces what is referred to as a false ___ when a legitimate program is mistakenly identified as a virus

positive

When an antivirus software detects malware, it can try to remove the infection, put the file into ___, or simply delete the file.

quarantine

Malware

refers to any computer program designed to surreptitiously enter a digital device

Modern ___ are used to hide malicious code by replacing parts of the operating system with modified code.

rootkits

Antivirus software is a type of utility software that looks for and eradicates malware by watching for virus ___ or through a(n) ___ analysis that examines the behavior of suspicious files.

signatures; heuristic

Computer worms are usually ___ executable files that can spread themselves from one device to another without any assistance from victims.

standalone

Malware exploit

the action carried out by malware code

What is significant about exclusions in antivirus settings?

they define files and locations that the antivirus software will not scan

What is the purpose of heuristic analysis?

to detect virus-like commands or behaviors

virus hoax

usually arrives as an email message containing dire warnings about a supposedly new virus on the loose

​A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate ____________ file on a host device.

virus executable

A computer ___ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.

worm

A(n) _________ is self replicating, self-distributing malware

worm

What is the key difference between computer viruses and worms?

worms are standalone executable programs, whereas viruses have to piggyback on to other EXE files


Ensembles d'études connexes

Chapter 1: Security and Risk Management (Domain 1)

View Set

Chapter 4 Quiz - Intro to Psychology

View Set

PSY104 Midterm 1 (Ch 1, 2, 11, 3, 4)

View Set

308 Ch. 29: Heart Disease Management

View Set

(PrepU) Chapter 39: Management of Patients with Oral and Esophageal Disorders

View Set

PreCalc_Trig- 1.02 Quiz: Sequence and Series

View Set

Macroeconomics Exam 3 Chapter 20

View Set