1002 Flashcards
code that runs on a computer without the users knowledge?
Virus
much like viruses except they self-replicate
worm
appear to perform desired function but are actually performing malicious functions behind the scenes
trojan horse
type of malicious software that is either downloaded unwittingly from a website or is installed along some other third party software.
spyware
software designed to gain admin level access to the core of a system without being detected
rootkit
hardware or software that captures keystrokes of a keyboard
keylogger
software designed to hold the computer hostage, encrypting files or locking the computer until the user pays the attacker.
ransomeware
what are the 7 best malware removal steps?
- id and research malware symptoms.
- quarantine the system
- disable system restore
- remediate the infected systems; update antimalware, scan and use removal techniques.
- schedule scans and run updates
- re-enable system restore and create a restore point
- educate end user.
displays current TCP/IP net configuration values
ipconfig
tests whether another host is available over the network
ping
sends packets to test destinations beyond the local comuter’s network
tracert
shows the network statistics for the local computer.
netstat
used to query dns
nslookup
used to map network drives, view computers, start stop services, and synchronize time.
net use, net view, net start, net stop, net time.