CTSP Exam Study Guide
Malware - answer✔software designed to infiltrate a computer system and possibly damage it
without the user's knowledge or consent
Virus - answer✔code that runs on a computer without the user's knowledge; it infects the
computer when the code is accessed and executed (love bug virus)
Worm - answer✔like a virus except that it self-replicates, whereas a virus does not (nimda,
propagated through network shares and mass e-mailing)
Trojan Horse - answer✔appear to perform desirable functions but are actually performing
malicious functions behind the scenes (remote access trojan, plugx)
Remote Access Trojan (RAT) - answer✔their capability to allow an attacker higher
administration privileges than those of the owner of the system makes them quite dangerous;
most common type of Trojan
Ransomware - answer✔a type of malware that restricts access to a computer system and
demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the
system (often propagated via a trojan, cryptolocker)
Spyware - answer✔malicious software either downloaded unwittingly from a website or installed
along with some other third-party software; usually collects information without the user's
consent (internet optimizer - dyfuca)
Adware - answer✔usually falls into the realm of spyware because it pops up advertisements
based on what it has learned from spying on the user
Grayware - answer✔describes applications that are behaving improperly but without serious
consequences
Rootkit - answer✔a type of software designed to gain administrator-level control over a
computer system without being detected (boot loader rootkits, evil maid attack, alureon)
Spam - answer✔the abuse of electronic messaging systems such as e-mail, texting, social media,
broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e-
mails)
Threat Vector - answer✔the method that a threat uses to access a target is known
Attack Vector - answer✔the means by which an attacker gains access to a computer in order to
deliver malicious software; most common is via software