Comptia+ Chapter 5 Flashcards
Malware
Malicious software designed to interfere with a computer’s normal functions and can be used to commit an unwanted and harmful action
Ransomware
Malicious software designed to extort money from victims in exchange for their endpoint device to be restored to its normal working state
Keylogger
Software or hardware that silently captures and stores each keystroke that a user types on the computer’s keyboard
Spyware
Tracking software that is deployed without the consent or control of the user
Trojan
An executable program that masquerades as performing a benign activity but also does something malicious
Remote access Trojan (RAT)
Basic functionality of a Trojan but also gives the threat agent unauthorized remote access to the victim’s computer by using specially configured communication protocols
Virus
Software that infects a computer with malware
File-based virus
Malicious computer code that becomes part of a file
Fileless virus
Viruses that take advantage of native services and processes that are part of the OS
Worm
A malicious program that uses a computer network to replicate
Bloatware
Software installed on a device without the user requesting it
Bot
An infected robot computer; software that allows the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks
Logic bomb
Computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
Rootkit
Malware that can hide its presence and the presence of other malware on the device
Backdoor
Gives access to a computer, program, or service that circumvents any normal security protections
Indicator of attack (IoA)
A sign an attack is currently underway
Account lockout
An indicator of attack in which a user account is inaccessible through a normal login attempt.
Concurrent session usage.
An indicator of attack in which both a legitimate user and an attacker are logged into the same account.
Blocked content
An indicator of attack in which data is no longer accessible.
Impossible travel.
An indicator of attack in which a resource is accessed that is not possible due to geography.
Resource consumption
An indicator of attack in which system resources such as memory or processing capabilities are suddenly depleted.
Resource inaccessibility
An indicator of attack in which a large-scale attack can block system resources from being accessed.
Out-of-cycle logging
An indicator of attack in which log records do not correspond to actual events that have occurred
Published/undocumented
An indicator of attack in which evidence from external sources can be used to identify and attack