Other Malware Types 2.4 Flashcards

1
Q

[…] track all of your key strokes that you type into your system and sends it to the attacker. They’re also used to capture information saved to the clipboard and take screenshots

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A […] malware waits for a predefined event before executing. It could be time/date or a particular user logging in that triggers it

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logic bombs are difficult to recognize, due to them not having any predefined […] associated with it. Every logic bomb is unique

A

Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A […] hides in the kernel of a Linux operating system and modifies core files. It is invisible to the OS and most antivirus utilities

A

Root Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly