Rédigé par des étudiants ayant réussi Disponible immédiatement après paiement Lire en ligne ou en PDF Mauvais document ? Échangez-le gratuitement 4,6 TrustPilot
logo-home
Examen

CTSP Exam Study Guide

Note
-
Vendu
-
Pages
4
Qualité
A+
Publié le
29-09-2024
Écrit en
2024/2025

©BRAINBARTER 2024/2025 CTSP Exam Study Guide Malware - answersoftware designed to infiltrate a computer system and possibly damage it without the user's knowledge or consent Virus - answercode that runs on a computer without the user's knowledge; it infects the computer when the code is accessed and executed (love bug virus) Worm - answerlike a virus except that it self-replicates, whereas a virus does not (nimda, propagated through network shares and mass e-mailing) Trojan Horse - answerappear to perform desirable functions but are actually performing malicious functions behind the scenes (remote access trojan, plugx) Remote Access Trojan (RAT) - answertheir capability to allow an attacker higher administration privileges than those of the owner of the system makes them quite dangerous; most common type of Trojan Ransomware - answera type of malware that restricts access to a computer system and demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the system (often propagated via a trojan, cryptolocker) Spyware - answermalicious software either downloaded unwittingly from a website or installed along with some other third-party software; usually collects information without the user's consent (internet optimizer - dyfuca) Adware - answerusually falls into the realm of spyware because it pops up advertisements based on what it has learned from spying on the user Grayware - answerdescribes applications that are behaving improperly but without serious consequences Rootkit - answera type of software designed to gain administrator-level control over a computer system without being detected (boot loader rootkits, evil maid attack, alureon) Spam - answerthe abuse of electronic messaging systems such as e-mail, texting, social media, broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e- mails) Threat Vector - answerthe method that a threat uses to access a target is known Attack Vector - answerthe means by which an attacker gains access to a computer in order to deliver malicious software; most commo

Montrer plus Lire moins
Établissement
CTSP
Cours
CTSP

Aperçu du contenu

©BRAINBARTER 2024/2025




CTSP Exam Study Guide

Malware - answer✔software designed to infiltrate a computer system and possibly damage it
without the user's knowledge or consent
Virus - answer✔code that runs on a computer without the user's knowledge; it infects the
computer when the code is accessed and executed (love bug virus)
Worm - answer✔like a virus except that it self-replicates, whereas a virus does not (nimda,
propagated through network shares and mass e-mailing)
Trojan Horse - answer✔appear to perform desirable functions but are actually performing
malicious functions behind the scenes (remote access trojan, plugx)
Remote Access Trojan (RAT) - answer✔their capability to allow an attacker higher
administration privileges than those of the owner of the system makes them quite dangerous;
most common type of Trojan
Ransomware - answer✔a type of malware that restricts access to a computer system and
demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the
system (often propagated via a trojan, cryptolocker)
Spyware - answer✔malicious software either downloaded unwittingly from a website or installed
along with some other third-party software; usually collects information without the user's
consent (internet optimizer - dyfuca)
Adware - answer✔usually falls into the realm of spyware because it pops up advertisements
based on what it has learned from spying on the user
Grayware - answer✔describes applications that are behaving improperly but without serious
consequences
Rootkit - answer✔a type of software designed to gain administrator-level control over a
computer system without being detected (boot loader rootkits, evil maid attack, alureon)
Spam - answer✔the abuse of electronic messaging systems such as e-mail, texting, social media,
broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e-
mails)
Threat Vector - answer✔the method that a threat uses to access a target is known

Attack Vector - answer✔the means by which an attacker gains access to a computer in order to
deliver malicious software; most common is via software

École, étude et sujet

Établissement
CTSP
Cours
CTSP

Infos sur le Document

Publié le
29 septembre 2024
Nombre de pages
4
Écrit en
2024/2025
Type
Examen
Contenu
Questions et réponses

Sujets

7,59 €
Accéder à l'intégralité du document:

Mauvais document ? Échangez-le gratuitement Dans les 14 jours suivant votre achat et avant le téléchargement, vous pouvez choisir un autre document. Vous pouvez simplement dépenser le montant à nouveau.
Rédigé par des étudiants ayant réussi
Disponible immédiatement après paiement
Lire en ligne ou en PDF

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
Brainbarter Kaplan University
S'abonner Vous devez être connecté afin de pouvoir suivre les étudiants ou les formations
Vendu
344
Membre depuis
2 année
Nombre de followers
154
Documents
22706
Dernière vente
4 jours de cela
A+ STUDY MATERIALS.

We offer a wide range of high-quality study materials, including study guides practice exams and flashcards. WELCOME.

3,6

56 revues

5
23
4
8
3
12
2
4
1
9

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions