Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONMalware Types

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Malware Types

Description:
Malware Types

Author:
BA
(Other tests from this author)

Creation Date:
01/09/2019

Category:
Others

Number of questions: 18
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Can replicate, but needs you to run a program in some way. Spreads though the file system or network. May be invisible and not cause damage. .
Malware that is inside the booting process - does not need the OS .
Malware that encrypts your data .
Bad guys want your money, so they take your most valued asset - your data .
Malware that self replicates - you do nothing and it runs on its own .
Application that pretends to be something other than what it is to trick you into running it; doesn't care about replicating; circumvents security .
The ultimate backdoor that gives admin control of the device .
Invisible to the OS - avoids detection by Anti-malware software .
Records keystrokes into a file and sends file off to the badguys; a way to circumvent encryption; can even record screenshots or clipboard .
Pop ups that can occur whether you are online or not; could have been loaded with other legit software .
Watches you, often for ad purposes; watches your browser and can even have it's own keylogger .
Your computer is a robot and you don't know it - its running as part of a network awaiting commands - used in DDoS attacks, sometimes rented .
Extrinsic danger to the system .
Utilized by an attacker to create a real threat .
Once a malware runs, it can open a door in the OS that allows other malware in; allows avoidance of normal authentication; some are intentionally programmed in .
Opening a compromised web page could allow dangerous code to install on your device .
The term for anti-virus updates .
Waits for a predefined event, time, or action and is often planted by a disgruntled employee .
Report abuse Consent Terms of use