Prevent Malware And Security Threats (Chapter 8) Flashcards

1
Q

Virus

A

Code designed to infect a computers files. When the file active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Viruses

A

Macro
- targets Microsoft Office documents
Boot sector
- targets the boot sector info, partition table or file system
Firmware
- targets the firmware of a specific component
Program
- targets executable code of another program
Scripts
- targets automated OS functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

A type of virus that is self-contained that spreads through memory and network connection rather than effecting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan Horse

A

A malicious software program hidden within an in conspicuous piece of software
- often function as a back door to application
- can acts as a proxy for an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Software that records information about a PC and it’s users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

A class of malware that modified system files often at the kernel level, to conceal it’s presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Malware that tries to extort money from the victim by appearing to lock their computer or by encrypting their files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anti-Virus software

A

Software capable of detecting and removing virus infections and other types of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Heuristic

A

Monitoring technique that allows dynamic pattern matching based on past experience rather than relying on pre-loaded signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware Removal

A

1) Identifies and research
2) Quarantine
- quarantine infected system
3) Disable
- disable system restore
4) Remediate
- scan and use removal techniques
5) Schedule
- schedule scans and run updates
6) Enable
- enable system restore
7) Educate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly