questions with answers |\ |\
Malware
A malicious software
|\ |\
Virus
malicious code that runs without user's knowledge. Viruses
|\ |\ |\ |\ |\ |\ |\ |\
require a user action in order to reproduce and spread
|\ |\ |\ |\ |\ |\ |\ |\ |\
Boot Sector Virus
|\ |\
A virus stored in the first sector of a hard drive and loaded into
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
memory upon boot up. It is hard to detect
|\ |\ |\ |\ |\ |\ |\ |\
Macros Virus |\
Virus embedded in a document and executed when the
|\ |\ |\ |\ |\ |\ |\ |\ |\
document is opened . |\ |\ |\
Program Virus |\
virus that infect an executable or an application
|\ |\ |\ |\ |\ |\ |\
,Multipartite Virus |\
A virus that combines both boot sector and program viruses
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
together by attaching itself to the boot sector and system files
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Encrypted Virus |\
A virus that uses a cipher to encrypt the content itself to avoid
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
detection by any antivirus software .
|\ |\ |\ |\ |\
Polymorphic Virus |\
An advanced version of an encrypted virus that changes itself
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
everytime its executed by trying to morph the way the code
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
looks so the sign-based antivirus cant defect it
|\ |\ |\ |\ |\ |\ |\
Metamorphic Virus |\
A virus that is able to rewrite itself entirely before it attempts to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
infect a file
|\ |\
Stealth Virus |\
a category of a virus protecting itself techniques viruses
|\ |\ |\ |\ |\ |\ |\ |\
, Armored-
layer of protection to confuse a program or person analyzing it
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Easter Egg |\
not a virus , trick user to infect themselves
|\ |\ |\ |\ |\ |\ |\ |\
Worms
A malware like a virus but it's able to replicate itself without user
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
interaction that cause disruptions to network traffic, computer
|\ |\ |\ |\ |\ |\ |\ |\
activities, and cause a system to crash or slow down
|\ |\ |\ |\ |\ |\ |\ |\ |\
Trojans
A malware disguised as a piece of harmless software to preform
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
desired and malicious functions to infect a system.
|\ |\ |\ |\ |\ |\ |\
Remote Access Trojan (RAT)|\ |\ |\
A malware that allows an attacker to remotely control an infected
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
computer
|\