Malware


Harmful programs designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as Malware

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system? Backdoor

Malicious code activated by a specific event is called: Logic Bomb

Which type of Trojan enables unauthorized remote access to a compromised system? RAT

Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack? Botnet

A malware-infected networked host under remote control of a hacker is commonly referred to as: Bot

Malicious software collecting information about users without their knowledge/consent is known as: Spyware

What is adware? Software that displays advertisements

Which of the following answers lists an example of spyware? Keylogger

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as: Rootkit

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. True

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called: Worm

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as: Ransomware

Which of the terms listed below refers to an example of a crypto-malware? Ransomware

Which of the following statements apply to the definition of a computer virus? A self-replicating computer program containing malicious segment, Requires its host application to be run to make the virus active, Attaches itself to an application program or other executable component.