Term
A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed. |
|
Definition
|
|
Term
A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols. |
|
Definition
|
|
Term
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as: |
|
Definition
|
|
Term
A virus that infects an executable program file is known as? |
|
Definition
|
|
Term
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as: |
|
Definition
|
|
Term
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique? |
|
Definition
|
|
Term
Select below the type of malware that appears to have a legitimate use, but contains something malicious: |
|
Definition
|
|
Term
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks? |
|
Definition
|
|
Term
Which of the following is malicious computer code that reproduces itself on the same computer? |
|
Definition
|
|
Term
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses? |
|
Definition
|
|