Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CTSP Exam Study Guide

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
29-09-2024
Written in
2024/2025

©BRAINBARTER 2024/2025 CTSP Exam Study Guide Malware - answersoftware designed to infiltrate a computer system and possibly damage it without the user's knowledge or consent Virus - answercode that runs on a computer without the user's knowledge; it infects the computer when the code is accessed and executed (love bug virus) Worm - answerlike a virus except that it self-replicates, whereas a virus does not (nimda, propagated through network shares and mass e-mailing) Trojan Horse - answerappear to perform desirable functions but are actually performing malicious functions behind the scenes (remote access trojan, plugx) Remote Access Trojan (RAT) - answertheir capability to allow an attacker higher administration privileges than those of the owner of the system makes them quite dangerous; most common type of Trojan Ransomware - answera type of malware that restricts access to a computer system and demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the system (often propagated via a trojan, cryptolocker) Spyware - answermalicious software either downloaded unwittingly from a website or installed along with some other third-party software; usually collects information without the user's consent (internet optimizer - dyfuca) Adware - answerusually falls into the realm of spyware because it pops up advertisements based on what it has learned from spying on the user Grayware - answerdescribes applications that are behaving improperly but without serious consequences Rootkit - answera type of software designed to gain administrator-level control over a computer system without being detected (boot loader rootkits, evil maid attack, alureon) Spam - answerthe abuse of electronic messaging systems such as e-mail, texting, social media, broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e- mails) Threat Vector - answerthe method that a threat uses to access a target is known Attack Vector - answerthe means by which an attacker gains access to a computer in order to deliver malicious software; most commo

Show more Read less
Institution
CTSP
Course
CTSP

Content preview

©BRAINBARTER 2024/2025




CTSP Exam Study Guide

Malware - answer✔software designed to infiltrate a computer system and possibly damage it
without the user's knowledge or consent
Virus - answer✔code that runs on a computer without the user's knowledge; it infects the
computer when the code is accessed and executed (love bug virus)
Worm - answer✔like a virus except that it self-replicates, whereas a virus does not (nimda,
propagated through network shares and mass e-mailing)
Trojan Horse - answer✔appear to perform desirable functions but are actually performing
malicious functions behind the scenes (remote access trojan, plugx)
Remote Access Trojan (RAT) - answer✔their capability to allow an attacker higher
administration privileges than those of the owner of the system makes them quite dangerous;
most common type of Trojan
Ransomware - answer✔a type of malware that restricts access to a computer system and
demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the
system (often propagated via a trojan, cryptolocker)
Spyware - answer✔malicious software either downloaded unwittingly from a website or installed
along with some other third-party software; usually collects information without the user's
consent (internet optimizer - dyfuca)
Adware - answer✔usually falls into the realm of spyware because it pops up advertisements
based on what it has learned from spying on the user
Grayware - answer✔describes applications that are behaving improperly but without serious
consequences
Rootkit - answer✔a type of software designed to gain administrator-level control over a
computer system without being detected (boot loader rootkits, evil maid attack, alureon)
Spam - answer✔the abuse of electronic messaging systems such as e-mail, texting, social media,
broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e-
mails)
Threat Vector - answer✔the method that a threat uses to access a target is known

Attack Vector - answer✔the means by which an attacker gains access to a computer in order to
deliver malicious software; most common is via software

Written for

Institution
CTSP
Course
CTSP

Document information

Uploaded on
September 29, 2024
Number of pages
4
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brainbarter Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
344
Member since
2 year
Number of followers
154
Documents
22706
Last sold
5 days ago
A+ STUDY MATERIALS.

We offer a wide range of high-quality study materials, including study guides practice exams and flashcards. WELCOME.

3.6

56 reviews

5
23
4
8
3
12
2
4
1
9

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions