Which of the following are types of malware that have the primary traits of circulation and or infection select all that apply?

  • School DeVry University, Chicago
  • Course Title SEC 285
  • Pages 3
  • Ratings 100% (1) 1 out of 1 people found this document helpful

This preview shows page 1 - 3 out of 3 pages.

Question 15 / 5 ptsWhich of the following is not one of the four methods for classifying the variousinstances of malware by using the primary trait that the malware possesses?ConcealmentCirculationCorrect!SourceCorrect. One method of classifying malware is by using the primary trait that the malwarepossesses. These traits are circulation, infection, concealment, and payload capabilities.InfectionQuestion 25 / 5 ptsA virus self-replicates on the host computer and spreads to other computers by itself.TrueCorrect!FalseCorrect. A virus reproduces itself by inserting its code into another file on the same computer. Avirus cannot automatically spread to another computer by itself. Because viruses are attachedto files, they are spread when a user transfers those files to other devices.Question 35 / 5 ptsMalware that locks or prevents a device from functioning properly until a fee has beenpaid is known asCorrect!

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":13094727,"author_id":5599557,"title":"Ch 2 - Malware \u0026 Social Engineering","created_at":"2018-04-03T04:58:30Z","updated_at":"2018-04-04T01:27:30Z","sample":false,"description":"Ch 2 quiz","alerts_enabled":true,"cached_tag_list":"security+","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":42,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["security+"],"admin_tag_list":[],"study_aid_type":"Quiz","show_path":"/quizzes/13094727","folder_id":14513289,"public_author":{"id":5599557,"profile":{"name":"nettv42","about":null,"avatar_service":"gravatar","locale":"en-US","google_author_link":null,"user_type_id":34,"escaped_name":"C Danvers","full_name":"C Danvers","badge_classes":""}}},"width":300,"height":250,"rtype":"Quiz","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Information Technology"},{"key":"rtopic","value":"Security Quizzes"},{"key":"env","value":"production"},{"key":"rtype","value":"Quiz"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en"},{"key":"ucurrency","value":"usd"}]}

{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":13094727,"author_id":5599557,"title":"Ch 2 - Malware \u0026 Social Engineering","created_at":"2018-04-03T04:58:30Z","updated_at":"2018-04-04T01:27:30Z","sample":false,"description":"Ch 2 quiz","alerts_enabled":true,"cached_tag_list":"security+","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":42,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["security+"],"admin_tag_list":[],"study_aid_type":"Quiz","show_path":"/quizzes/13094727","folder_id":14513289,"public_author":{"id":5599557,"profile":{"name":"nettv42","about":null,"avatar_service":"gravatar","locale":"en-US","google_author_link":null,"user_type_id":34,"escaped_name":"C Danvers","full_name":"C Danvers","badge_classes":""}}},"width":300,"height":250,"rtype":"Quiz","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Information Technology"},{"key":"rtopic","value":"Security Quizzes"},{"key":"env","value":"production"},{"key":"rtype","value":"Quiz"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en"},{"key":"ucurrency","value":"usd"}]}

11/22/19

Welcome to IT 101, where the experts at 2W Tech will tackle a hot topic in the IT industry and break it down for educational purposes.

Not all cybercrimes are created equal, so you should know how your IT infrastructure can be attacked so you know how to defend yourself. This knowledge also comes in handy in the unfortunate event of a breach.

Which of the following are types of malware that have the primary traits of circulation and or infection select all that apply?

First up: malware.

Malware is a software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action. Malware uses a threat vector to deliver a malicious “payload” that performs a harmful function once it is invoked.

However, malware is most often used as a general term that refers to a wide variety of damaging software programs. As security defenses have emerged, so have different types of malware. The four main traits viruses are classified under are circulation, infection, concealment and payload capabilities.

Circulation/infection malware include viruses, worms and Trojans. While a viruses is akin to those that affect biological organisms, a worm is a malicious program that uses a computer network to replicate. It is designed to enter a computer operating system on the host computer. Once the worm has exploited the vulnerability on one system, it immediately searches for another computer on the network that has the same vulnerability.

Trojans – like the Trojan horse that took out Troy of Greek mythology – is an executable program that masquerades as performing a benign activity but also does something malicious.

Concealment malware most commonly comes with the installment of a rootkit on a device. Rootkits change the operating system to force it to ignore their malicious files or activities while also hiding or removing all evidence that may reveal the malware.

The primary payload capabilities are to collect data, delete data, modify system security settings and launch attacks. Spyware is one type of payload capability, which secretly spies on users by collecting information without their consent. Adware delivers advertising content that is unexpected and unwanted by the user. Ransomware, one of the fastest-growing and newest types of malware, prevents a user’s device from properly operating until a fee is paid.

Keeping your company secure is important, so let the experts help you. Contact 2W Tech today if you need help with your IT security strategy and ongoing protection plan.

Read More:

NIST Releases Final Version of Big Data Interoperability Framework

Office 365 Phishing Attacks Target Admins

What are the 4 main types of malware?

7 Common Types of Malware.
Trojans. A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of tricking you into executing malicious software on your computer..
Spyware. ... .
Adware. ... .
Rootkits. ... .
Ransomware. ... .
Worms. ... .
Keyloggers..

What are the 3 common malware attacks?

The most common types of malware include viruses, keyloggers, worms, trojans, ransomware / crypto-malware, logic bombs, bots/botnets, adware & spyware, and rootkits.

What is malware Name the 3 types of malware?

The most common types of malware include viruses, worms, trojans, ransomware, bots or botnets, adware, spyware, rootkits, fileless malware, and malvertising.

What are the top 5 malware?

The top malware strains of 2021 are: Agent Tesla, AZORult, Formbook, Ursnif, LokiBot, MOUSEISLAND, NanoCore, Qakbot, Remcos, TrickBot and GootLoader. Malicious cyber actors have used Agent Tesla, AZORult, Formbook, LokiBot, NanoCore, Remcos, and TrickBot for at least five years.