수업의 질을 더욱 빠르게 높여보세요
액티비티 생성하기
로그인
가입하기
한국어
홈
기능
이용 요금 안내
홈
기능
문의
이용 요금 안내
로그인
가입하기
언어
내 학교
내 프로필 페이지
개인정보 수정하기
언어 및 위치
로그아웃
Català
Cebuano
Čeština
Dansk
Deutsch
Eesti keel
English
Español
Français
Hrvatski
Indonesia
Italiano
Latvian
Lietuvių
Magyar
Melayu
Nederlands
Norsk
Polski
Português
Română
Slovenčina
Slovenščina
Srpski
Suomi
Svenska
Tagalog
Türkçe
Vietnamese
ελληνικά
български
Русский
Српски
Українська
עִברִית
عربى
हिंदी
ગુજરાતી
ภาษาไทย
한국어
日本語
简体字
繁體字
Malware - Software designed to take over or damage a computer without the user's knowledge or approval., Virus - A program that attempts to damage a computer system and replicate itself to other computer systems., Worm - A self-replicating malware program., Trojan Horse - A malicious program that is disguised as legitimate or desirable software., Zombie - A computer that is infected with malware and is controlled by a command and control center called a zombie master., Botnet - A group of zombie computers that are commanded from a central control infrastructure., Rootkit - A set of programs that allows attackers to maintain hidden, administrator-level access to a computer., Logic Bomb - Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met., Spyware - Software installed without the user's consent or knowledge and is designed to intercept or take partial control of the user's computer., Adware - Malware that monitors a user's personal preferences and sends pop-up ads that match those preferences., Ransomware - Malware that denies access to a computer system until the user pays a ransom., Scareware - A scam to fool a user into thinking there is some form of malware on the system., Crimeware - Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers., Crypto-Malware - Ransomware that encrypts files until a ransom is paid., Remote Access Trojan (RAT) - Malware that includes a back door to allow a hacker administrative control over the target computer., Hacker - A person who commits crimes through gaining unauthorized access to computer systems., Cracker - A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities; and/or cracking protective measures., Script Kiddie - A less-skilled hacker who often relies on automated tools or scripts written by crackers to scan systems and exploit weaknesses., Potentially Unwanted Program (PUP) - A PUP is a software inadvertently installed that contains adware, installs toolbars, or has other objectives., Fileless virus - A fileless virus uses legitimate programs to infect a computer.,
14%
Security+: Malware Types
공유
만든이
Terry22
9th Grade
10th Grade
11th Grade
12th Grade
Vocational / Technical
Higher Education
CompTIA
Computing
CompTIA
Cybersecurity
Security
더보기
콘텐츠 편집
인쇄
퍼가기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
매치업
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?