2.3.8 Malware

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

10 Terms

1
New cards

Which type of malware is software installed alongside a package selected by the user or bundled with a new computer system?

Bloatware

2
New cards

What is the primary function of crypto-ransomware?

To encrypt files on the infected system and demand a ransom for the decryption key

3
New cards

Which virus operates only in memory and usually exploits a trusted application like PowerShell to circumvent traditional endpoint security solutions?

Fileless malware

4
New cards

What differentiates a logic bomb from other types of malware?

Logic bombs can only be triggered by a specific event or condition.

5
New cards

Which of the following describes a logic bomb?

A program that performs a malicious activity at a specific time or after a triggering event.

Correct Answer:

6
New cards

Which of the following is a type of malware that prevents the system from being used until the victim pays the attacker money?

Ransomware

7
New cards

Which kind of malware provides an attacker with administrative control over a target computer through a backdoor?

Remote Access Trojan (RAT)

8
New cards

Which of the following are characteristics of a rootkit? (Select two.)

Requires administrator-level privileges for installation.

Resides below regular antivirus software detection.

9
New cards

Which of the following BEST describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source.

10
New cards

In 2001, a worm exploited vulnerabilities in Microsoft Internet Information Services (IIS) to infect over 250,000 systems in under nine hours.

What was this worm called?

code red