answers Newest RATED A+ 2025/2026
Malware
A malicious so ware
Virus
malicious code that runs without user's knowledge. Viruses require a user ac on in order to
reproduce and spread
Boot Sector Virus
A virus stored in the first sector of a hard drive and loaded into memory upon boot up. It is hard
to detect
Macros Virus
Virus embedded in a document and executed when the document is opened .
Program Virus
virus that infect an executable or an applica on
Mul par te Virus
A virus that combines both boot sector and program viruses together by a&aching itself to the
boot sector and system files
Encrypted Virus
A virus that uses a cipher to encrypt the content itself to avoid detec on by any an virus
so ware .
Polymorphic Virus
An advanced version of an encrypted virus that changes itself every me its executed by trying
to morph the way the code looks so the sign-based an virus cant defect it
Metamorphic Virus
A virus that is able to rewrite itself en rely before it a&empts to infect a file
Stealth Virus
a category of a virus protec ng itself techniques viruses
, Armored-
layer of protec on to confuse a program or person analyzing it
Easter Egg
not a virus , trick user to infect themselves
AD
Worms
A malware like a virus but it's able to replicate itself without user interac on that cause
disrup ons to network traffic, computer ac vi es, and cause a system to crash or slow down
Trojans
A malware disguised as a piece of harmless so ware to preform desired and malicious func ons
to infect a system.
Remote Access Trojan (RAT)
A malware that allows an a&acker to remotely control an infected computer
Ransomware
A malware that restricts access by encryp ng a vic ms file or computer un l ransom payment is
recieved
Spyware
A malware that secretly gathers informa on about you without your consent by using a
keylogger that captures keystrokes and take screenshots.
Adware
Displays adver sments based upon its spying
Grayware
mane a computer system to behave improperly
Rootkit
A so ware aimed to gain administra ve level control on a system without detec on. The
a&acker uses a technique called DLL Injec on to maintain their persistent control
DLL Injec on