13.1 Flashcards
Malware
Term for Malicious Software
Quarantine
Separating a file to give the administrator the chance to research the file to identify whether or not the file is a threat.
False Positive
A file or program may exhibit behavior or coding that triggers a signature or behavior alert from an anti-malware system.
Looks Malicious but isn’t.
Signature
An algorithm or hash that is unique to a specific attack method or virus
Behavior
Monitoring for real time malicious activities from programs or files
Virus
A program that attaches itself to a file or another program. A virus cannot stand-alone.
Worm
A program that replicates and propagates itself without having to attach itself to a file or program.
Auto-Protect Scans
Continuously inspect files and email data for viruses as they are read from or written to a computer.
McAfee VSE Access Protection
Prevent unwanted changes to your computer by restricting access to specified ports, files, shares, registry keys, and registry values
Scanning Items On-Access
Examines files on a computer as they are accessed, providing a real-time detection of threats
Scanning Items On-Demand
Uses two methods of scanning:
In memory process scanning
Incremental or resumable scanning
Detection Definitions
The effectiveness of VSE depends on the scanning engine and information in the detection definition (DAT) files.