Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance.

Beoordeling
-
Verkocht
-
Pagina's
25
Cijfer
A+
Geüpload op
23-07-2025
Geschreven in
2024/2025

CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance. CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance. CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance.

Meer zien Lees minder
Instelling
Comptia Security+ SYO-601
Vak
Comptia Security+ SYO-601

Voorbeeld van de inhoud

CompTIA Security+ Section 6-11
Malware, Data Protection, Cryptographic
Solutions, Risk Management, Third Party
risks and Governance and Compliance.
Malware [Section 6] ANS: Any software that is designed to infiltrate a computer system without the
user's knowledge.



Threat Vector [Section 6] ANS: Specific methods used by an attacker to infiltrate a victim's system.
(Unpatched software, code, phishing and more).



Attack Vector [Section 6] ANS: A means by which an attacker gains access to a computer to infect the
system with malware.



Virus [Section 6] ANS: Malicious software that attaches to clean files and spreads into a computer
system.



Worms [Section 6] ANS: Standalone malware programs that replicate and spread to other systems by
exploiting software vulnerabilities.



Trojans [Section 6] ANS: Malicious programs which appear to be legitimate software that allows
unauthorised access to a victim's system when executed.



Ransomware [Section 6] ANS: Encrypts a user's data and holds it, hostage, until a ransom is paid to the
attacker for decryption.



Zombies (Botnets) [Section 6] ANS: Compromised computers that are remotely controlled by attackers
and used in coordination to form a botnet.

,Botnet (Botnets) [Section 6] ANS: Network of zombies and are often used for DDoS attacks, spam
distribution, or cryptocurrency mining.



Rootkits [Section 6] ANS: Malicious tools that hide their activities and operate at the OS level to allow
for ongoing privileged access.



Backdoors [Section 6] ANS: Malicious means of bypassing normal authentication processes to gain
unauthorised access to a system.



Logic Bombs [Section 6] ANS: Embedded code placed in legitimate programs that executes a malicious
action when a specific condition or trigger occurs.



Keyloggers [Section 6] ANS: Record a user's keystrokes and are ued to capture passwords or other
sensitive information.



Spyware [Section 6] ANS: Secretly monitors and gathers user information or activities and sends data to
third parties.



Bloatware [Section 6] ANS: Unnecessary or pre-installed software that consumes system resources and
space without offering any value to the user.



Malware Exploitation Techniques [Section 6] ANS: Involve methods by which malware infiltrates and
infects targeted systems.



Boot Sector Virus [Section 6] ANS: Stored in the first sector of a HD and is then loaded into memory
whenever the computer boots.



Macro Virus [Section 6] ANS: A form of code that allows a virus to be embedded inside another
document so that when the document is opened by the user, the virus is executed.

, Program Virus [Section 6] ANS: Tries to find executables or application files to infect with their malicious
code.



Multipartite Virus [Section 6] ANS: A combination of a boto sector type virus and a program virus.



Encrypted Virus [Section 6] ANS: Designed to hide itself from being detected by encrypting its malicious
code or payloads to avoid detection by any antivirus software.



Polymorphic virus [Section 6] ANS: Advanced version of an encrypted virus, but instead of just
encrypting the contents, it will actually change the virus's code each time it is executed by altering the
decryption module in order for it to evade detection.



Metamorphic Virus [Section 6] ANS: Able to rewrite itself entirely before it attempts to infect a given
file.



Stealth Virus [Section 6] ANS: Not necessarily a virus as much as it is a technique used to prevent the
virus from being detected.



Armored Virus [Section 6] ANS: Have a layer of protection to confuse a program or a person who's
trying to analyse it.



Hoax Virus [Section 6] ANS: A form of technical social engineering that attempts to scare end users into
taking an undesirable action on their system.



Remote Access Trojan (RAT) [Section 6] ANS: Type of Trojan that is widely used by modern attackers
because it provides the attacker with remote control of a victim machine.

Geschreven voor

Instelling
Comptia Security+ SYO-601
Vak
Comptia Security+ SYO-601

Documentinformatie

Geüpload op
23 juli 2025
Aantal pagina's
25
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
lectjoseph Harvard University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
77
Lid sinds
2 jaar
Aantal volgers
23
Documenten
5502
Laatst verkocht
1 week geleden

learning is hard ,but with me it will be easier. Timely ,detailed and organized study guides and notes that will save you a lot of study time. Reviews are highly appreciated. Wishing you the best

3.5

10 beoordelingen

5
4
4
1
3
2
2
2
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen