Threats, Attacks and Vulnerabilities - Malware Types Flashcards

1
Q

Malicious code that attaches itself to a host application. The host application must be executed to run, and the malicious code executes when the host application is executed.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A string of code embedded into an application or script that will execute in response to an event.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides another way of accessing a system.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Appears to be something useful but includes a malicious component, such as installing a backdoor on a user’s system.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of malware that allows attackers to take control of systems from remote locations and often delivered via drive-by downloads.

A

RATs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A specific type of Trojan where attackers encrypt the user’s data or take control of the computer and lock out the user.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of malware that attempts to capture a user’s keystrokes.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software that is installed on users’ systems without their awareness or consent to monitor the user’s computer and the user’s activity.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multiple computers that act as software robots (bots) and function together in a network (such as the Internet), often for malicious purposes.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A group of programs (or, in rare instances, a single program) that hides the fact that the system has been infected or compromised by malicious code.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly