chapter 5 -2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Describe what Ransomware is.

attacks a computer and limits the user's ability to access the computer

List some malware prevention strategies.

frequent media scans, multiple anti-malware software shields, and frequent signatures database updates

1. Describe what Trojan horse virus is.

is a malware that either hides or masquerades as a useful or benign program

What is the difference between a Quick malware scan and a full scan?

quick scans generally only scan files that are likely to contain malware such as executable files. Quick scans can reduce the negative performance impact on computers. Ensure full scans occur periodically

What would you do to ensure you clean all rootkits off your system?

run windows 10 defender offline scan from inside windows 10

Describe what a virus is

software program that attaches itself to or copies itself into another program

When scanning for malware what is meant by the shield function?

software that intercepts all incoming and optionally outgoing information scanning each message or file for malware content

When is the best time to run antivirus scans?

the best time to run a scan is once per week

What is a resource to use when developing a malware eradication plan?

your anti-malware software support resources and Microsoft online resources

What is the difference between a virus and a worm?

A virus attaches to or infects a host program and a worm stands alone program does not need a host

1. Describe what a zero-day attack is.

A zero-day attack is a malware that is actively exploiting an unknown vulnerability

Describe what a Buffer overflows is.

Is a condition in which a running program stores data in an area outside the memory location set aside for the data

What are some common types of malware?

Trojan horses, ransomware, rootkits, and spyware, viruses, and worms

1. Describe what worm virus is.

is a type of malware that is self-contained it is a program the replicates and sends copies of itself to another computer generally across a network

Describe what cryptomining is.

is the process in which transactions for various forms of cryptocurrency are vertified and added to the blockchain digital ledger

Describe what Cryptojacking is.

is using the victims computing power to mine cryptocurrency

1. Describe what Heuristic scanning is.

it compares observed behavior with stored malware behavior

Why is it a bad idea to disable your anti-malware application?

it is a bad idea because your device will be unprotected against malware and virus that can affect your device

How does a Rootkit work?

it modifies or replaces one or more existing programs to hide the fact that a computer has been compromised


Set pelajaran terkait

Fossil Fuels I: Coal, Natural Gas and Oil

View Set

Field Tech II - III Chapter 8: Wireless Networking

View Set

NSG 310 - Foundations - DavidEdge for F+E, Acid Base, Oxygenation

View Set

Patho PrepU Ch.14 (Somatosensory Function, Pain, and Temperature)

View Set

NISSAN VARIABLE COMPRESSION TURBO ENGINE

View Set