Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CTSP Exam Study Guide

Puntuación
-
Vendido
-
Páginas
4
Grado
A+
Subido en
29-09-2024
Escrito en
2024/2025

©BRAINBARTER 2024/2025 CTSP Exam Study Guide Malware - answersoftware designed to infiltrate a computer system and possibly damage it without the user's knowledge or consent Virus - answercode that runs on a computer without the user's knowledge; it infects the computer when the code is accessed and executed (love bug virus) Worm - answerlike a virus except that it self-replicates, whereas a virus does not (nimda, propagated through network shares and mass e-mailing) Trojan Horse - answerappear to perform desirable functions but are actually performing malicious functions behind the scenes (remote access trojan, plugx) Remote Access Trojan (RAT) - answertheir capability to allow an attacker higher administration privileges than those of the owner of the system makes them quite dangerous; most common type of Trojan Ransomware - answera type of malware that restricts access to a computer system and demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the system (often propagated via a trojan, cryptolocker) Spyware - answermalicious software either downloaded unwittingly from a website or installed along with some other third-party software; usually collects information without the user's consent (internet optimizer - dyfuca) Adware - answerusually falls into the realm of spyware because it pops up advertisements based on what it has learned from spying on the user Grayware - answerdescribes applications that are behaving improperly but without serious consequences Rootkit - answera type of software designed to gain administrator-level control over a computer system without being detected (boot loader rootkits, evil maid attack, alureon) Spam - answerthe abuse of electronic messaging systems such as e-mail, texting, social media, broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e- mails) Threat Vector - answerthe method that a threat uses to access a target is known Attack Vector - answerthe means by which an attacker gains access to a computer in order to deliver malicious software; most commo

Mostrar más Leer menos
Institución
CTSP
Grado
CTSP

Vista previa del contenido

©BRAINBARTER 2024/2025




CTSP Exam Study Guide

Malware - answer✔software designed to infiltrate a computer system and possibly damage it
without the user's knowledge or consent
Virus - answer✔code that runs on a computer without the user's knowledge; it infects the
computer when the code is accessed and executed (love bug virus)
Worm - answer✔like a virus except that it self-replicates, whereas a virus does not (nimda,
propagated through network shares and mass e-mailing)
Trojan Horse - answer✔appear to perform desirable functions but are actually performing
malicious functions behind the scenes (remote access trojan, plugx)
Remote Access Trojan (RAT) - answer✔their capability to allow an attacker higher
administration privileges than those of the owner of the system makes them quite dangerous;
most common type of Trojan
Ransomware - answer✔a type of malware that restricts access to a computer system and
demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the
system (often propagated via a trojan, cryptolocker)
Spyware - answer✔malicious software either downloaded unwittingly from a website or installed
along with some other third-party software; usually collects information without the user's
consent (internet optimizer - dyfuca)
Adware - answer✔usually falls into the realm of spyware because it pops up advertisements
based on what it has learned from spying on the user
Grayware - answer✔describes applications that are behaving improperly but without serious
consequences
Rootkit - answer✔a type of software designed to gain administrator-level control over a
computer system without being detected (boot loader rootkits, evil maid attack, alureon)
Spam - answer✔the abuse of electronic messaging systems such as e-mail, texting, social media,
broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e-
mails)
Threat Vector - answer✔the method that a threat uses to access a target is known

Attack Vector - answer✔the means by which an attacker gains access to a computer in order to
deliver malicious software; most common is via software

Escuela, estudio y materia

Institución
CTSP
Grado
CTSP

Información del documento

Subido en
29 de septiembre de 2024
Número de páginas
4
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$8.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Brainbarter Kaplan University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
344
Miembro desde
2 año
Número de seguidores
154
Documentos
22706
Última venta
4 días hace
A+ STUDY MATERIALS.

We offer a wide range of high-quality study materials, including study guides practice exams and flashcards. WELCOME.

3.6

56 reseñas

5
23
4
8
3
12
2
4
1
9

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes