100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SC2 SSCP Systems And Application Security Exam With Latest Updated Questions And Answers 2024 $14.49   Add to cart

Exam (elaborations)

SC2 SSCP Systems And Application Security Exam With Latest Updated Questions And Answers 2024

 1 view  0 purchase
  • Course
  • SC2 SSCP Systems And Application Security
  • Institution
  • SC2 SSCP Systems And Application Security

SC2 SSCP Systems And Application Security Exam With Latest Updated Questions And Answers 2024

Preview 3 out of 21  pages

  • August 7, 2024
  • 21
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • SC2 SSCP Systems And Application Security
  • SC2 SSCP Systems And Application Security
avatar-seller
RANKGRADES
SC2 SSCP Systems And Application
Security Exam With Latest Updated
Questions And Answers 2024



2 ycomponents yof ymalware y- ycorrect yanswer.Propogation yMechanism y- ythe yway ythat
ymalware yobjects yspread

Payload y- ythe ymalicious yaction ythat yit yperforms

Viruses y- ycorrect yanswer.spread yfrom ysystem yto ysystem ybecause yof yhuman yaction

Worms y- ycorrect yanswer.spread yfrom ysystem yto ysystem ywithout yuser yinteraction

Trojan yHorse y- ycorrect yanswer.Disguise ythemselves yas ybeneficial yprograms
Acts yas yadvertised ybut ydelivers yundesired ymalware

Remote yAccess yTrojan y(RAT) y- ycorrect yanswer.A yTrojan ythat yalso ygives ythe ythreat
yagent yunauthorized yremote yaccess yto ythe yvictim's ycomputer yby yusing yspecially

yconfigured ycommunication yprotocols.




Adware y- ycorrect yanswer.software ythat yautomatically ydisplays yor ydownloads yadvertising
ymaterial y(often yunwanted) ywhen ya yuser yis yonline.

- ychanging ythe ydefault ysearrch yengine
- ydisplaying ypop yup yads
- yreplacing ylegitimate yads ywith yother yads

Spyware y- ycorrect yanswer.software ythat yenables ya yuser yto yobtain ycovert yinformation
yabout yanother's ycomputer yactivities yby ytransmitting ydata ycovertly yfrom ytheir yhard ydrive.

- ylogging ykeystrokes
- ymonitoring yweb ybrowsing
- ysearching yhard ydrives yand ycloud ystorage

Potentially yunwanted yprograms y(PUPs) y- ycorrect yanswer.Software ythat ycannot
ydefinitively ybe yclassed yas ymalicious, ybut ymay ynot yhave ybeen ychosen yby yor ywanted yby

ythe yuser.




Ransomware y- ycorrect yanswer.Software ythat yencrypts yprograms yand ydata yuntil ya
yransom yis ypaid yto yremove yit.

,- yE.g. yWannaCry

Cryptomalware y- ycorrect yanswer.Malware yto yremain yin yplace yfor yas ylong yas ypossible,
yquietly ymining ycrypto ycurrency yin ythe ybackground.




Scareware y- ycorrect yanswer.A ytype yof ymalware ythat's ydownloaded yonto yyour ycomputer
yand ythat ytries yto yconvince yyou ythat yyour ycomputer yis yinfected ywith ya yvirus yor yother ytype

yof ymalware.




How yto yprevent ymalware y- ycorrect yanswer.1. yanti-malware ysoftware
2. ysecurity ypatches
3. yuser yeducation

Malware yPayloads y- ycorrect yanswer.1. yAdware
2. ySpyware
3. yRansomware
4. yCryptomalware

Malware yPropagation yMechanisms y- ycorrect yanswer.1. yViruses
2. yWorms
3. yTrojan yHorses

Backdoor y- ycorrect yanswer.A ybackdoor yoccurs ywhen ya yprogrammer yprovides ya ymeans
yto ygrant ythemselves yor yothers yfuture yaccess yto ya ysystem




Backdoor yMechanisms y- ycorrect yanswer.- yhardcoded yaccounts
- ydefault ypasswords
- yunknown yaccess ychannels

Logic yBombs y- ycorrect yanswer.A ylogic ybomb yis ymalware ythat's yset yto yexecute ya ypayload
ywhen ycertain yconditions yare ymet

- ydate/time yreached
- yfile ycontents
- yapi ycall yresults

Malicious yCode y- ycorrect yanswer.Backdoors yand yLogic yBombs

Advanced ymalware yconcepts y- ycorrect yanswer.Root yKits
Fileless yViruses

Root yAccount y- ycorrect yanswer.a yspecial ysuperuser yaccount ythat yprovides yunrestricted
yaccess yto ysystem yresources




Rootkits y- ycorrect yanswer.Root ykits yare ya ytype yof ymalware ythat yoriginally ywere ydesigned
yfor yprivilege yescalation. yA yhacker ywould ygain yaccess yto ya ynormal yuser yaccount yon ya

ysystem, yand ythen yuse ya yroot ykit yto ygain yroot, yor yescalate ythe ynormal yuser yaccess yto

, yunrestricted ysuperuser yaccess. yThe yterm yroot ykit yhas yevolved yover ythe yyears, yand yis
ynow yalso yused yto ydescribe ysoftware ytechniques ydesigned yto yhide yother ysoftware yon ya

ysystem. yRoot ykits ydeliver ya yvariety yof ypayloads. yThese yinclude ybackdoors, ybotnet

yagents, yand yadware yor yspyware.




Ring yProtection yModel y- ycorrect yanswer.mechanisms yto yprotect ydata yand yfunctionality
yfrom yfaults y(by yimproving yfault ytolerance) yand ymalicious ybehavior y(by yproviding

ycomputer ysecurity). yA yprotection yring yis yone yof ytwo yor ymore yhierarchical ylevels yor ylayers

yof yprivilege ywithin ythe yarchitecture yof ya ycomputer ysystem




User ymode yrootkits y- ycorrect yanswer.- yRun ywith ynormal yuser yprivileges
- yAre yeasy yto ywrite yand ydifficult yto ydetect

Kernel ymode yrootkits y- ycorrect yanswer.- yRun ywith ysystem yprivileges
- yDifficult yto ywrite yand yeasy yto ydetect

Fileless yViruses y- ycorrect yanswer.Reside yin ymemory yonly yand ydo ynot ysave ythemselves
yto ythe ylocal ystorage ydevices.

- yMicrosoft yoffice ymacros
- yJavaScript ycode
- yWindows yRegistry ypersistence

Botnets y- ycorrect yanswer.a yset yof ycomputers ythat yare ypenetrated yby ymalicious ysoftware
yknown yas ymalware ythat yallows yan yexternal yagent yto ycontrol ytheir yactions




How ythey yare yused:
- yrenting yout ycomputing ypower
- ydeliver yspam
- yengaging yin yDDoS yattacks
- ymining yBitcoin
- yWaging ybrute yforce yattacks

Communication yand yControl yvia:
- yInternet yRelay yChat y(IRC)
- yTwitter
- yPeer-to-peer ywithin ythe ybotnet

Code ySigning y- ycorrect yanswer.The yprocess yof yassigning ya ycertificate yto ycode. yThe
ycertificate yincludes ya ydigital ysignature yand yvalidates ythe ycode.




Cryptolocker yis yan yexample yof ywhat ytype yof ymalicious ysoftware? y- ycorrect
yanswer.Ransomware




Script yKiddies y- ycorrect yanswer.Individuals ywho ywant yto ybreak yinto ycomputers yto ycreate
ydamage, yyet ylack ythe yadvanced yknowledge yof ycomputers yand ynetworks yneeded yto ydo

yso.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller RANKGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72349 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart