1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Which type of malware is software installed alongside a package selected by the user or bundled with a new computer system?
Bloatware
What is the primary function of crypto-ransomware?
To encrypt files on the infected system and demand a ransom for the decryption key
Which virus operates only in memory and usually exploits a trusted application like PowerShell to circumvent traditional endpoint security solutions?
Fileless malware
What differentiates a logic bomb from other types of malware?
Logic bombs can only be triggered by a specific event or condition.
Which of the following describes a logic bomb?
A program that performs a malicious activity at a specific time or after a triggering event.
Correct Answer:
Which of the following is a type of malware that prevents the system from being used until the victim pays the attacker money?
Ransomware
Which kind of malware provides an attacker with administrative control over a target computer through a backdoor?
Remote Access Trojan (RAT)
Which of the following are characteristics of a rootkit? (Select two.)
Requires administrator-level privileges for installation.
Resides below regular antivirus software detection.
Which of the following BEST describes spyware?
It monitors the actions you take on your machine and sends the information back to its originating source.
In 2001, a worm exploited vulnerabilities in Microsoft Internet Information Services (IIS) to infect over 250,000 systems in under nine hours.
What was this worm called?
code red