1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Virus
What type of malware requires user action to spread?
Worm
Which malware can replicate without any user interaction?
Trojan
Which malware disguises itself as legitimate or desirable software?
Botnet
What is a network of compromised computers controlled remotely by an attacker?
Rootkit
Which malware type gains administrative-level control over a system?
Backdoor
What is used to bypass normal authentication and security functions?
Logic Bomb
What is malicious code that only runs when specific conditions are met?
Spyware
Which malware is designed to secretly gather and send information about a user?
Bloatware
What is pre-installed, often unwanted software on new devices called?
Fileless Malware
Which malware operates in memory without writing to the local file system?
DLL injection
What technique forces a process to load a malicious DLL file?