Exam (elaborations)
SC2 SSCP Systems And Application Security Exam With Latest Updated Questions And Answers 2024
Course
SC2 SSCP Systems And Application Security
Institution
SC2 SSCP Systems And Application Security
SC2 SSCP Systems And Application Security Exam With Latest Updated Questions And Answers 2024
[Show more]
Preview 3 out of 21 pages
Uploaded on
August 7, 2024
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
Institution
SC2 SSCP Systems And Application Security
Course
SC2 SSCP Systems And Application Security
$14.49
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
SC2 SSCP Systems And Application
Security Exam With Latest Updated
Questions And Answers 2024
2 ycomponents yof ymalware y- ycorrect yanswer.Propogation yMechanism y- ythe yway ythat
ymalware yobjects yspread
Payload y- ythe ymalicious yaction ythat yit yperforms
Viruses y- ycorrect yanswer.spread yfrom ysystem yto ysystem ybecause yof yhuman yaction
Worms y- ycorrect yanswer.spread yfrom ysystem yto ysystem ywithout yuser yinteraction
Trojan yHorse y- ycorrect yanswer.Disguise ythemselves yas ybeneficial yprograms
Acts yas yadvertised ybut ydelivers yundesired ymalware
Remote yAccess yTrojan y(RAT) y- ycorrect yanswer.A yTrojan ythat yalso ygives ythe ythreat
yagent yunauthorized yremote yaccess yto ythe yvictim's ycomputer yby yusing yspecially
yconfigured ycommunication yprotocols.
Adware y- ycorrect yanswer.software ythat yautomatically ydisplays yor ydownloads yadvertising
ymaterial y(often yunwanted) ywhen ya yuser yis yonline.
- ychanging ythe ydefault ysearrch yengine
- ydisplaying ypop yup yads
- yreplacing ylegitimate yads ywith yother yads
Spyware y- ycorrect yanswer.software ythat yenables ya yuser yto yobtain ycovert yinformation
yabout yanother's ycomputer yactivities yby ytransmitting ydata ycovertly yfrom ytheir yhard ydrive.
- ylogging ykeystrokes
- ymonitoring yweb ybrowsing
- ysearching yhard ydrives yand ycloud ystorage
Potentially yunwanted yprograms y(PUPs) y- ycorrect yanswer.Software ythat ycannot
ydefinitively ybe yclassed yas ymalicious, ybut ymay ynot yhave ybeen ychosen yby yor ywanted yby
ythe yuser.
Ransomware y- ycorrect yanswer.Software ythat yencrypts yprograms yand ydata yuntil ya
yransom yis ypaid yto yremove yit.
,- yE.g. yWannaCry
Cryptomalware y- ycorrect yanswer.Malware yto yremain yin yplace yfor yas ylong yas ypossible,
yquietly ymining ycrypto ycurrency yin ythe ybackground.
Scareware y- ycorrect yanswer.A ytype yof ymalware ythat's ydownloaded yonto yyour ycomputer
yand ythat ytries yto yconvince yyou ythat yyour ycomputer yis yinfected ywith ya yvirus yor yother ytype
yof ymalware.
How yto yprevent ymalware y- ycorrect yanswer.1. yanti-malware ysoftware
2. ysecurity ypatches
3. yuser yeducation
Malware yPayloads y- ycorrect yanswer.1. yAdware
2. ySpyware
3. yRansomware
4. yCryptomalware
Malware yPropagation yMechanisms y- ycorrect yanswer.1. yViruses
2. yWorms
3. yTrojan yHorses
Backdoor y- ycorrect yanswer.A ybackdoor yoccurs ywhen ya yprogrammer yprovides ya ymeans
yto ygrant ythemselves yor yothers yfuture yaccess yto ya ysystem
Backdoor yMechanisms y- ycorrect yanswer.- yhardcoded yaccounts
- ydefault ypasswords
- yunknown yaccess ychannels
Logic yBombs y- ycorrect yanswer.A ylogic ybomb yis ymalware ythat's yset yto yexecute ya ypayload
ywhen ycertain yconditions yare ymet
- ydate/time yreached
- yfile ycontents
- yapi ycall yresults
Malicious yCode y- ycorrect yanswer.Backdoors yand yLogic yBombs
Advanced ymalware yconcepts y- ycorrect yanswer.Root yKits
Fileless yViruses
Root yAccount y- ycorrect yanswer.a yspecial ysuperuser yaccount ythat yprovides yunrestricted
yaccess yto ysystem yresources
Rootkits y- ycorrect yanswer.Root ykits yare ya ytype yof ymalware ythat yoriginally ywere ydesigned
yfor yprivilege yescalation. yA yhacker ywould ygain yaccess yto ya ynormal yuser yaccount yon ya
ysystem, yand ythen yuse ya yroot ykit yto ygain yroot, yor yescalate ythe ynormal yuser yaccess yto
, yunrestricted ysuperuser yaccess. yThe yterm yroot ykit yhas yevolved yover ythe yyears, yand yis
ynow yalso yused yto ydescribe ysoftware ytechniques ydesigned yto yhide yother ysoftware yon ya
ysystem. yRoot ykits ydeliver ya yvariety yof ypayloads. yThese yinclude ybackdoors, ybotnet
yagents, yand yadware yor yspyware.
Ring yProtection yModel y- ycorrect yanswer.mechanisms yto yprotect ydata yand yfunctionality
yfrom yfaults y(by yimproving yfault ytolerance) yand ymalicious ybehavior y(by yproviding
ycomputer ysecurity). yA yprotection yring yis yone yof ytwo yor ymore yhierarchical ylevels yor ylayers
yof yprivilege ywithin ythe yarchitecture yof ya ycomputer ysystem
User ymode yrootkits y- ycorrect yanswer.- yRun ywith ynormal yuser yprivileges
- yAre yeasy yto ywrite yand ydifficult yto ydetect
Kernel ymode yrootkits y- ycorrect yanswer.- yRun ywith ysystem yprivileges
- yDifficult yto ywrite yand yeasy yto ydetect
Fileless yViruses y- ycorrect yanswer.Reside yin ymemory yonly yand ydo ynot ysave ythemselves
yto ythe ylocal ystorage ydevices.
- yMicrosoft yoffice ymacros
- yJavaScript ycode
- yWindows yRegistry ypersistence
Botnets y- ycorrect yanswer.a yset yof ycomputers ythat yare ypenetrated yby ymalicious ysoftware
yknown yas ymalware ythat yallows yan yexternal yagent yto ycontrol ytheir yactions
How ythey yare yused:
- yrenting yout ycomputing ypower
- ydeliver yspam
- yengaging yin yDDoS yattacks
- ymining yBitcoin
- yWaging ybrute yforce yattacks
Communication yand yControl yvia:
- yInternet yRelay yChat y(IRC)
- yTwitter
- yPeer-to-peer ywithin ythe ybotnet
Code ySigning y- ycorrect yanswer.The yprocess yof yassigning ya ycertificate yto ycode. yThe
ycertificate yincludes ya ydigital ysignature yand yvalidates ythe ycode.
Cryptolocker yis yan yexample yof ywhat ytype yof ymalicious ysoftware? y- ycorrect
yanswer.Ransomware
Script yKiddies y- ycorrect yanswer.Individuals ywho ywant yto ybreak yinto ycomputers yto ycreate
ydamage, yyet ylack ythe yadvanced yknowledge yof ycomputers yand ynetworks yneeded yto ydo
yso.