CompTIA Security+ SY0-701
Study online at https://quizlet.com/_e2pxgt
1. Malware A malicious software
2. Virus malicious code that runs without user's knowledge. Viruses require
a user action in order to reproduce and spread
3. Boot Sector Virus A virus stored in the first sector of a hard drive and loaded into
memory upon boot up. It is hard to detect
4. Macros Virus Virus embedded in a document and executed when the document
is opened .
5. Program Virus virus that infect an executable or an application
6. Multipartite Virus A virus that combines both boot sector and program viruses togeth-
er by attaching itself to the boot sector and system files
7. Encrypted Virus A virus that uses a cipher to encrypt the content itself to avoid
detection by any antivirus software .
8. Polymorphic Virus An advanced version of an encrypted virus that changes itself every-
time its executed by trying to morph the way the code looks so the
sign-based antivirus cant defect it
9. Metamorphic Virus A virus that is able to rewrite itself entirely before it attempts to infect
a file
10. Stealth Virus a category of a virus protecting itself techniques viruses
11. Armored- layer of protection to confuse a program or person analyzing it
12. Easter Egg not a virus , trick user to infect themselves
13. Worms A malware like a virus but it's able to replicate itself without user
interaction that cause disruptions to network traffic, computer ac-
tivities, and cause a system to crash or slow down
, CompTIA Security+ SY0-701
Study online at https://quizlet.com/_e2pxgt
14. Trojans A malware disguised as a piece of harmless software to preform
desired and malicious functions to infect a system.
15. Remote Access Trojan A malware that allows an attacker to remotely control an infected
(RAT) computer
16. Ransomware A malware that restricts access by encrypting a victims file or com-
puter until ransom payment is recieved
17. Spyware A malware that secretly gathers information about you without your
consent by using a keylogger that captures keystrokes and take
screenshots.
18. Adware Displays advertisments based upon its spying
19. Grayware mane a computer system to behave improperly
20. Rootkit A software aimed to gain administrative level control on a system
without detection. The attacker uses a technique called DLL Injec-
tion to maintain their persistent control
21. DLL Injection A malicious code inserted into a running process on a Windows
machine by taking advantage of Dynamic Link Libraries that are
loaded at running time.
22. Driver manipulation An attack that relies on compromising the Kernel-mode device
drivers that operate at a private or system level. A shim is placed
between two components to intercept calls and redirect them
23. What makes up a rootkit? DDL Injection and Driver Manipulation
24. Spam
Study online at https://quizlet.com/_e2pxgt
1. Malware A malicious software
2. Virus malicious code that runs without user's knowledge. Viruses require
a user action in order to reproduce and spread
3. Boot Sector Virus A virus stored in the first sector of a hard drive and loaded into
memory upon boot up. It is hard to detect
4. Macros Virus Virus embedded in a document and executed when the document
is opened .
5. Program Virus virus that infect an executable or an application
6. Multipartite Virus A virus that combines both boot sector and program viruses togeth-
er by attaching itself to the boot sector and system files
7. Encrypted Virus A virus that uses a cipher to encrypt the content itself to avoid
detection by any antivirus software .
8. Polymorphic Virus An advanced version of an encrypted virus that changes itself every-
time its executed by trying to morph the way the code looks so the
sign-based antivirus cant defect it
9. Metamorphic Virus A virus that is able to rewrite itself entirely before it attempts to infect
a file
10. Stealth Virus a category of a virus protecting itself techniques viruses
11. Armored- layer of protection to confuse a program or person analyzing it
12. Easter Egg not a virus , trick user to infect themselves
13. Worms A malware like a virus but it's able to replicate itself without user
interaction that cause disruptions to network traffic, computer ac-
tivities, and cause a system to crash or slow down
, CompTIA Security+ SY0-701
Study online at https://quizlet.com/_e2pxgt
14. Trojans A malware disguised as a piece of harmless software to preform
desired and malicious functions to infect a system.
15. Remote Access Trojan A malware that allows an attacker to remotely control an infected
(RAT) computer
16. Ransomware A malware that restricts access by encrypting a victims file or com-
puter until ransom payment is recieved
17. Spyware A malware that secretly gathers information about you without your
consent by using a keylogger that captures keystrokes and take
screenshots.
18. Adware Displays advertisments based upon its spying
19. Grayware mane a computer system to behave improperly
20. Rootkit A software aimed to gain administrative level control on a system
without detection. The attacker uses a technique called DLL Injec-
tion to maintain their persistent control
21. DLL Injection A malicious code inserted into a running process on a Windows
machine by taking advantage of Dynamic Link Libraries that are
loaded at running time.
22. Driver manipulation An attack that relies on compromising the Kernel-mode device
drivers that operate at a private or system level. A shim is placed
between two components to intercept calls and redirect them
23. What makes up a rootkit? DDL Injection and Driver Manipulation
24. Spam