What is a program that appears to be a legitimate application utility game or screensaver but performs malicious activities surreptitiously?

A program that performs a malicious activity at a specific time or after a triggering event.

A logic bomb is a program that performs a malicious activity at a specific time or after a triggering event. Logic bombs can be planted by a virus, a Trojan horse, or an intruder. Logic bombs may perform their malicious activity at a specific time and date or when a specific event occurs on the system, such as logging in, accessing an online bank account, or encrypting a file.

A type of malicious code similar to a virus whose primary purpose is to duplicate itself and spread, while not necessarily intentionally damaging or destroying resources, is a worm.

A program that appears to be a legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously is a Trojan horse.

A program that has no useful purpose but attempts to spread itself to other systems and often damages resources on the systems where it is found is a virus.

Which kind of malware provides an attacker with administrative control?

A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.

Which type of virus operates only in memory and usually exploits a trusted application like powershell to circumvent traditional endpoint security solutions?

Fileless viruses operate only in memory to avoid detection by traditional endpoint security solutions that are focused on matching signatures to files that have been written to the hard drive.

Which type of malware do the zombie computers represent?

SYS-201.

Which type of malware monitors your actions?

Spyware. Spyware is a form of malware that hides on your device, monitors activity, and steals sensitive information like financial data, account information, logins, and more. Spyware can spread by exploiting software vulnerabilities or else be bundled with legitimate software or in Trojans.

Toplist

Neuester Beitrag

Stichworte