2.4 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Malware

Malicious software designed to harm or impede regular computer functions.

2
New cards

Trojan

Malware disguised as a non-malicious file that tricks users into executing it; not focused on replication - they are typically spread by social engineering.

3
New cards

Rootkit

Malware that embeds deep into operating systems, modifying core system files; may require a specific AV tool for removal.

4
New cards

Virus

Malware that replicates from computer to computer but needs human execution to start.

5
New cards

Spyware

Software designed to gather information without the user's knowledge, often used for tracking online activity.

6
New cards

Ransomware

Malicious software that encrypts files, demanding ransom for decryption while keeping the OS running.

7
New cards

Keylogger

Malware that captures keyboard input to obtain sensitive data such as usernames and passwords.

8
New cards

Boot sector virus

A virus that embeds itself into the boot sector of a hard drive, relaunching every time the operating system starts.

9
New cards

Cryptominer

Malware that utilizes the victim's computer resources for cryptocurrency mining.

10
New cards

Stalkerware

Malware designed for unwanted surveillance of individuals, often operating in stealth mode.

11
New cards

Fileless malware

Malicious software that operates in system memory, leaving no trace on the hard drive.

12
New cards

Adware

Software that displays or downloads unwanted advertising material when online.

13
New cards

Potentially unwanted program (PUP)

A program that may be unwanted, often downloaded alongside desired software.

14
New cards

Windows Recovery Environment

A command line environment that operates from the recovery partition and allows full administrative control over Windows, enabling malware removal before the system boots.

15
New cards

Endpoint detection and response (EDR)

Security solution that continuously monitors for and responds to advanced threats on endpoints.

16
New cards

Managed detection and response (MDR)

Service using human expertise and automated tools to monitor, detect, and respond to threats.

17
New cards

Extended detection and response (XDR)

Cybersecurity approach integrating data from multiple sources (endpoints, networks, cloud, etc.) to provide a comprehensive view of threats.

18
New cards

Antivirus

Software designed to identify, contain, and remove viruses from systems.

19
New cards

Anti-malware

Software designed to identify, contain, and remove malware from systems.

20
New cards

Email security gateway (SEG)

Product that analyzes and filters malicious emails before they reach users' inboxes.

21
New cards

Software firewall

Software controlling network communications, preventing malware from accessing an OS.

22
New cards

Antiphishing training

Training that helps users recognize and avoid phishing attempts and suspicious activities.

23
New cards

OS reinstallation

Reinstalling an operating system to remove a malware infection, or restoring from a backup.