Chapter 3 Flashcards

(11 cards)

1
Q

What are the different types of malware?

A

Malware types include:
* Ransomware
* Trojan
* Worm
* Spyware
* Bloatware
* Virus
* Keylogger
* Logic bomb
* Rootkit

Each type of malware has distinct characteristics and methods of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ransomware?

A

A type of malware that encrypts files and demands payment for decryption

Ransomware can cause significant data loss and financial damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Trojan.

A

A type of malware disguised as legitimate software

Trojans can create backdoors for further malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Worms?

A

Self-replicating malware that spreads across networks

Worms can exploit vulnerabilities in software to propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Spyware?

A

Malware designed to gather information from a user’s device without their knowledge

Spyware can track user behavior and steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: _______ is software that is unnecessary and often unwanted, consuming system resources.

A

Bloatware

Bloatware can slow down systems and reduce performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Virus?

A

Malware that attaches itself to legitimate files and spreads when those files are executed

Viruses can corrupt or delete data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Keylogger.

A

A type of malware that records keystrokes to capture sensitive information

Keyloggers can be used to steal passwords and other personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Logic bomb?

A

Malware that triggers under specific conditions, such as a date or event

Logic bombs can cause damage or data loss when activated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Rootkit.

A

A set of tools used to gain unauthorized access to a computer while hiding its presence

Rootkits can allow continued privileged access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Given a scenario, what should you analyze to identify indicators of malicious activity?

A

Look for unusual behaviors or changes in system performance

Indicators can include unexpected file changes, system slowdowns, or unauthorized access attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly