Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance.

Rating
-
Sold
-
Pages
25
Grade
A+
Uploaded on
23-07-2025
Written in
2024/2025

CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance. CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance. CompTIA Security+ Section 6-11 Malware, Data Protection, Cryptographic Solutions, Risk Management, Third Party risks and Governance and Compliance.

Show more Read less
Institution
Comptia Security+ SYO-601
Course
Comptia Security+ SYO-601

Content preview

CompTIA Security+ Section 6-11
Malware, Data Protection, Cryptographic
Solutions, Risk Management, Third Party
risks and Governance and Compliance.
Malware [Section 6] ANS: Any software that is designed to infiltrate a computer system without the
user's knowledge.



Threat Vector [Section 6] ANS: Specific methods used by an attacker to infiltrate a victim's system.
(Unpatched software, code, phishing and more).



Attack Vector [Section 6] ANS: A means by which an attacker gains access to a computer to infect the
system with malware.



Virus [Section 6] ANS: Malicious software that attaches to clean files and spreads into a computer
system.



Worms [Section 6] ANS: Standalone malware programs that replicate and spread to other systems by
exploiting software vulnerabilities.



Trojans [Section 6] ANS: Malicious programs which appear to be legitimate software that allows
unauthorised access to a victim's system when executed.



Ransomware [Section 6] ANS: Encrypts a user's data and holds it, hostage, until a ransom is paid to the
attacker for decryption.



Zombies (Botnets) [Section 6] ANS: Compromised computers that are remotely controlled by attackers
and used in coordination to form a botnet.

,Botnet (Botnets) [Section 6] ANS: Network of zombies and are often used for DDoS attacks, spam
distribution, or cryptocurrency mining.



Rootkits [Section 6] ANS: Malicious tools that hide their activities and operate at the OS level to allow
for ongoing privileged access.



Backdoors [Section 6] ANS: Malicious means of bypassing normal authentication processes to gain
unauthorised access to a system.



Logic Bombs [Section 6] ANS: Embedded code placed in legitimate programs that executes a malicious
action when a specific condition or trigger occurs.



Keyloggers [Section 6] ANS: Record a user's keystrokes and are ued to capture passwords or other
sensitive information.



Spyware [Section 6] ANS: Secretly monitors and gathers user information or activities and sends data to
third parties.



Bloatware [Section 6] ANS: Unnecessary or pre-installed software that consumes system resources and
space without offering any value to the user.



Malware Exploitation Techniques [Section 6] ANS: Involve methods by which malware infiltrates and
infects targeted systems.



Boot Sector Virus [Section 6] ANS: Stored in the first sector of a HD and is then loaded into memory
whenever the computer boots.



Macro Virus [Section 6] ANS: A form of code that allows a virus to be embedded inside another
document so that when the document is opened by the user, the virus is executed.

, Program Virus [Section 6] ANS: Tries to find executables or application files to infect with their malicious
code.



Multipartite Virus [Section 6] ANS: A combination of a boto sector type virus and a program virus.



Encrypted Virus [Section 6] ANS: Designed to hide itself from being detected by encrypting its malicious
code or payloads to avoid detection by any antivirus software.



Polymorphic virus [Section 6] ANS: Advanced version of an encrypted virus, but instead of just
encrypting the contents, it will actually change the virus's code each time it is executed by altering the
decryption module in order for it to evade detection.



Metamorphic Virus [Section 6] ANS: Able to rewrite itself entirely before it attempts to infect a given
file.



Stealth Virus [Section 6] ANS: Not necessarily a virus as much as it is a technique used to prevent the
virus from being detected.



Armored Virus [Section 6] ANS: Have a layer of protection to confuse a program or a person who's
trying to analyse it.



Hoax Virus [Section 6] ANS: A form of technical social engineering that attempts to scare end users into
taking an undesirable action on their system.



Remote Access Trojan (RAT) [Section 6] ANS: Type of Trojan that is widely used by modern attackers
because it provides the attacker with remote control of a victim machine.

Written for

Institution
Comptia Security+ SYO-601
Course
Comptia Security+ SYO-601

Document information

Uploaded on
July 23, 2025
Number of pages
25
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$14.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
lectjoseph Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
77
Member since
2 year
Number of followers
23
Documents
5502
Last sold
1 week ago

learning is hard ,but with me it will be easier. Timely ,detailed and organized study guides and notes that will save you a lot of study time. Reviews are highly appreciated. Wishing you the best

3.5

10 reviews

5
4
4
1
3
2
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions