CompTIA Security+ SY0-701 Exam with verified detailed || || || || || || ||
answers
Malware
A malicious software
|| ||
Virus
malicious code that runs without user's knowledge. Viruses require a user action in order to
|| || || || || || || || || || || || || || ||
reproduce and spread || ||
Boot Sector Virus || ||
A virus stored in the first sector of a hard drive and loaded into memory upon boot up. It is hard to
|| || || || || || || || || || || || || || || || || || || || ||
detect
||
Macros Virus ||
Virus embedded in a document and executed when the document is opened .
|| || || || || || || || || || || ||
Program Virus ||
virus that infect an executable or an application
|| || || || || || ||
Multipartite Virus ||
A virus that combines both boot sector and program viruses together by attaching itself to the boot
|| || || || || || || || || || || || || || || ||
sector and system files
|| || || ||
Encrypted Virus ||
A virus that uses a cipher to encrypt the content itself to avoid detection by any antivirus software
|| || || || || || || || || || || || || || || || || ||
.
Polymorphic Virus ||
An advanced version of an encrypted virus that changes itself everytime its executed by trying to
|| || || || || || || || || || || || || || || ||
morph the way the code looks so the sign-based antivirus cant defect it
|| || || || || || || || || || || ||
Metamorphic Virus ||
A virus that is able to rewrite itself entirely before it attempts to infect a file
|| || || || || || || || || || || || || || ||
Stealth Virus ||
a category of a virus protecting itself techniques viruses
|| || || || || || || ||
, 2
Armored-
layer of protection to confuse a program or person analyzing it
|| || || || || || || || || ||
Easter Egg ||
not a virus , trick user to infect themselves
|| || || || || || || ||
Worms
A malware like a virus but it's able to replicate itself without user interaction that cause
|| || || || || || || || || || || || || || || ||
disruptions to network traffic, computer activities, and cause a system to crash or slow down
|| || || || || || || || || || || || || ||
Trojans
A malware disguised as a piece of harmless software to preform desired and malicious functions
|| || || || || || || || || || || || || || ||
to infect a system.
|| || ||
Remote Access Trojan (RAT) || || ||
A malware that allows an attacker to remotely control an infected computer
|| || || || || || || || || || ||
Ransomware
A malware that restricts access by encrypting a victims file or computer until ransom payment is
|| || || || || || || || || || || || || || || ||
recieved
Spyware
A malware that secretly gathers information about you without your consent by using a keylogger
|| || || || || || || || || || || || || || ||
that captures keystrokes and take screenshots.
|| || || || ||
Adware
Displays advertisments based upon its spying || || || || ||
Grayware
mane a computer system to behave improperly
|| || || || || ||
Rootkit
A software aimed to gain administrative level control on a system without detection. The attacker
|| || || || || || || || || || || || || || ||
uses a technique called DLL Injection to maintain their persistent control
|| || || || || || || || || ||
DLL Injection ||
A malicious code inserted into a running process on a Windows machine by taking advantage of
|| || || || || || || || || || || || || || || ||
Dynamic Link Libraries that are loaded at running time. || || || || || || || ||
Driver manipulation ||