Which type of virus operates only in memory and usually exploits a trusted application like powershell to circumvent traditional endpoint security solutions?

Which type of virus operates only in memory and usually exploits a trusted application like powershell to circumvent traditional endpoint security solutions?

https://labsimapp.testout.com/v6_0_486/index.html

Section Quiz

Candidate:Zemas Howard (zmshoward)

Date: 1/5/2022 7:03:44 am•Time spent:05:45

Score:100%Passing Score:80%

Question 1:Correct

A collection of zombie computers have been set up to collect personal information. Which type of

malware do the zombie computers represent?

E XPLANATION

A botnet is a collection of zombie computers that are controlled from a central control infrastructure

to propagate spam or to collect usernames and passwords to access secure information.

A logic bomb is malware that lies dormant until triggered.

A Trojan horse is a malicious program that is disguised as legitimate software.

Spyware monitors the actions performed on a machine and then sends the information back to its

originating source.

Trojan horse

Spyware

Botnet

Logic bomb

What is a spyware virus?

Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent. A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user's consent.

Which kind of malware provides an attacker with administrative control over a target computer through a backdoor?

A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.

What are the 3 types of viruses?

They include:.
Macro viruses – These are the largest of the three virus types. ... .
Boot record infectors – These viruses are known also as boot viruses or system viruses. ... .
File infectors – These viruses target ..

Is Trojan a malware?

A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.