GCGA Ch. 6 Determining Malware Types (ST) Flashcards

(11 cards)

1
Q

Malware types

A

include several different types of malicious code, including ransomware, Trojans, worms, spyware, bloatware, viruses, keyloggers, logic bombs, and rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

a type of malware that takes control of a user’s system or data. Criminals demand a ransom payment before returning control of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan

A

appears to be one thing, such as pirated software or free antivirus software, but is something malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RAT

A

A remote access Trojan (RAT) is a type of malware that allows attackers to take control of systems from remote locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worm

A

self-replicating malware that travels throughout a network without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spyware

A

software installed on user systems without the user’s knowledge or consent and it monitors the user’s activities. It sometimes includes a keylogger that records user keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bloatware

A

software installed when a user installs another program, often without the user’s knowledge. Some bloatware changes the default home page of a user’s browser or change the default search engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

malicious code that attaches itself to a host application. The code runs and replicates to other systems when the application is launched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardware or software keyloggers

A

track all of the keyboard activity on a system and report it back to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logic bomb

A

executes in response to an event, such as a day, time, or condition. Malicious insiders have planted logic bombs into existing systems, and these logic bombs have delivered their payload after the employee left the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkits

A

take root-level or kernel-level control of a system. They hide their processes to avoid detection, and they can remove user privileges and modify system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly