Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Malware Quiz

CompTIA+ topic

QuestionAnswers
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as: c. ransomware
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities... a. true
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called: b. worm
What is a PUP? (Select 3 answers) d. application downloaded and installed with the user's consent (legal app) e. type of computer program explicitly classified as malware by AV applications f. type of free, utility software often bundled w/ paid app correct: A, C, D
Which type of malware resides only in RAM? b. fileless virus
What is the function of a C2 server? b. botnet control
A malware-infected network host under remote control of a hacker is commonly referred to as: c. bot
Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack? a. botnet
Which of the following is an example of cryptomalware? b. ransomware
Malicious code activated by a specific event is called: d. logic bomb
Malicious software collecting information about users without their knowledge/consent is known as: d. spyware
Which of the following is an example of spyware? a. keylogger
Which type of Trojan enables unauthorized remote access to a compromised system? b. rat
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as: a. rootkit
Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system? d. backdoor
Created by: laylanichole
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards