What is a program that can copy itself and gain access to a computer in an unauthorized way?

Malware, being one of the common causes of data breaches, is something every IT and security expert should be concerned about. It’s a fact that many businesses will install anti-virus and forget about it, not knowing that malware can still bypass anti-virus software and firewalls.

The truth is, no anti-virus or anti-malware will protect you from ALL malware. If an infection slips through, it means that your confidential information will be put at risk.

With that being said, it’s important to know the different types of malware and how to prevent them. Keep reading to learn more.

What is a program that can copy itself and gain access to a computer in an unauthorized way?
Share files and messages securely with TitanFile!
  • State-of-the-art Security - protect confidential files and messages.
  • Up to 90% time-savings - self-serve file-sharing for staff and clients.
  • No limitations - no limits on attachment sizes, types, or volumes.
Try TitanFile Free

What is malware?

Malware is an umbrella term for any piece of software that has malicious intent. There are several types of malware and each of them has a unique way of infiltrating your computer which may include attempts at gaining unauthorized control of your computer systems, stealing your personal information, encrypting your important files, or causing other harm to your computers. Sometimes the damage can be irrevocable.

Where does malware come from?

Some of the most common sources of malware are email attachments, malicious websites, torrents, and shared networks.

Phishing – Emails can be disguised to be coming from a fraudulent company for the sole purpose of getting you to reveal personal information

Malicious Websites – Some websites may attempt to install malware onto your computer, usually through popups or malicious links

Torrents – Files shared through BitTorrents are generally unsafe because you never know what to expect until they’re downloaded

Shared Networks – A malware-infected computer on the same shared network may spread malware onto your computer

7 Common Types of Malware

What is a program that can copy itself and gain access to a computer in an unauthorized way?

Here’s a list of the common types of malware and their malicious intent:

1. Trojans

A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of tricking you into executing malicious software on your computer.

2. Spyware

Spyware invades your computer and attempts to steal your personal information such as credit card or banking information, web browsing data, and passwords to various accounts.

3. Adware

Adware is unwanted software that displays advertisements on your screen. Adware collects personal information from you to serve you with more personalized ads.

4. Rootkits

Rootkits enable unauthorized users to gain access to your computer without being detected.

5. Ransomware

Ransomware is designed to encrypt your files and block access to them until a ransom is paid.

6. Worms

A worm replicates itself by infecting other computers that are on the same network. They’re designed to consume bandwidth and interrupt networks.

7. Keyloggers

Keyloggers keep track of your keystrokes on your keyboard and record them on a log. This information is used to gain unauthorized access to your accounts.

How to prevent malware

Since malware is so widespread and hundreds of thousands of new malicious files are reported every day, there’s no single solution that will prevent all malware. For this reason, we recommend using multiple solutions to add more layers of protection to your computers.

Use Software

Here is a list of some malware prevention software we recommend:

  • BitDefender – BitDefender is a well-rounded anti-virus solution that is currently protecting over 500 million users worldwide. It offers unparalleled endpoint protection and virus protection.  Free BitDefender trial.
  • Malwarebytes – The most effective and widely-adopted anti-malware on the market. The scans are thorough and the program prevents you from executing malicious files and visiting malicious websites. Free Malwarebytes trial.
  • TitanFile – TitanFile is an easy-to-use, secure file-sharing platform that enables you to send and receive confidential files securely. TitanFile automatically scans the files for malware before they’re downloaded to your computer. Free TitanFile trial.
  • Spybots – Effectively protects you from spyware, protecting your private information and other data from being sent to third parties. Get access.

Be Cautious

A little common sense and caution can also prevent malware from infecting your computer. Here are some tips:

  • If an email looks suspicious or too good to be true, don’t open it
  • Don’t download files from non-reputable websites as they could contain malicious files
  • Don’t use your work laptop on public networks

Additional Tip: Always back up your files!

As mentioned earlier in this article, sometimes malware can cause irrevocable damage — such as file encryption and file loss. To save yourself a lot of trouble, it’s important to keep your files backed up so you can restore them in case something like this happens.

Malware

Malware refers to a group of computer programs designed to work against the requirements of a user’s computer for the purposes of causing harm. Those who spread malware are called “hackers.” There are several different classes of malware. Malware is a significant problem throughout the world resulting in billions of dollars in damages to individuals and businesses every year. Below is a summary of some of the most common forms of malware.

Viruses

These are computer programs that replicate and modify other programs by inserting code. Viruses typically target individual computers.

Worm

A worm is a malicious program that replicates itself in order to spread to other computers, often in a single network. Worms target groups of connected computers on a network.

Trojan Horse

A Trojan horse is a malicious program designed to trick a user about its true intent. Trojan horses typically show up in e-mail attachments or drive-by downloads. They often create “backdoors” which allows the creator unauthorized access to a user’s computer.

Ransomware

Ransomware is a malicious program that encrypts the files on a user’s computer so they are unreadable. These files can only be retrieved if the user agrees to pay a ransom (usually in Bitcoin) within a specified amount of time to obtain a decryption key. Decryption without the key is impossible.

Spyware

Spyware is a type of malicious program covertly installed on a user’s computer to collect important information such as credit card numbers or passwords.

Scareware

Scareware is a type of malicious program designed to scare people into buying unwanted programs such as anti-virus software. Scareware typically comes in the form of warnings or alerts that the user’s computer is infected with a virus and the purchase of software is the only way to save the computer.

Cards Return to Set Details

Term
1. Which type of malware can copy itself and infect a computer without the user’s consent or knowledge?a) virusb) Trojan horsec) rootkit

d) backdoor

Definition
Answer: aDifficulty: EasySection Reference: Looking at Types of Malware

Explanation: A computer virus is a program that can copy itself and infect a computer without the user’s consent or knowledge. Early viruses were usually some form of executable code that was hidden in the boot sector of a disk or as an executable file (that is, a filename with an .exe or .com extension). Later, viruses mutated enough to affect data documents that included macro languages.

Term
2. What type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?a) virusb) Trojan horsec) worm

d) backdoor

Definition
Answer: cDifficulty: MediumSection Reference: Looking at Types of Malware

Explanation: A worm is a self-replicating program that copies itself to other computers on a network without any user intervention. Unlike a virus, a worm does not corrupt or modify files on the target computer. Instead, it consumes bandwidth and processor and memory resources, slowing the system down or causing it to be unusable. Worms usually spread via security holes in operating systems or TCP/IP software implementations.

Term
3. What malware looks like a useful or desired executable program but is in reality program that is supposed to cause harm to your computer or steal information from your computer?a) virusb) Trojan horsec) worm

d) backdoor

Definition
Answer: bDifficulty: EasySection Reference: Looking at Types of Malware

Explanation: A Trojan horse is an executable program that appears as a desirable or useful program. Because it appears to be desirable or useful, users are tricked into loading and executing it on their systems. After the program is loaded, it might cause a user’s computer to become unusable, or it might bypass the user’s system security, allowing private information (including passwords, credit card numbers, and Social Security numbers) to be accessible by an outside party. In some cases, a Trojan horse may even execute adware.

Term
4. What malware collects a user’s personal information or details about your browsing habits without your knowledge?a) virusb) Trojan horsec) worm

d) spyware

Definition
Answer: dDifficulty: EasySection Reference: Looking at Types of Malware

Explanation: Spyware is a type of malware that is installed on a computer to collect a user’s personal information or details about browsing habits, often without the user’s knowledge. Spyware can also install additional software, redirect your web browser to other sites, or change your home page. One example of spyware is the keylogger, which records every key a user presses.

Term
5. What malware gives administrator-level control over a computer system?a) rootkitb) Trojan horsec) worm

d) spyware

Definition
Answer: aDifficulty: HardSection Reference: Looking at Types of Malware

Explanation: A rootkit is a software or hardware device designed to gain administrator-level control over a computer system without being detected. Rootkits can target the BIOS, hypervisor, boot loader, kernel, or (less commonly) libraries or applications.

Term
6. What software component comes with Windows Vista and Windows 7 to defend against spyware?a) Windows Firewallb) Windows Defenderc) UAC

d) Windows Anti-virus

Definition
Answer: bDifficulty: MediumSection Reference: Using Security Updates and Antivirus Software for Clients

Explanation: Windows Defender is a software product from Microsoft that is intended to prevent, remove, and quarantine spyware in Microsoft Windows. This program helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer.

Term
7. What do you call a message warning you to delete an essential Windows file?a) virus hoaxb) keyloggerc) backdoor

d) worm

Definition
Answer: aDifficulty: EasySection Reference: Examining a Virus Hoax

Explanation: A virus hoax is a message warning recipients of a nonexistent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone they know. This is a form of social engineering that plays on people’s ignorance and fear.

Term
8. What server can be used to install Windows updates for your organization?a) SCOMb) WSUSc) IIS

d) WDS

Definition
Answer: bDifficulty: MediumSection Reference: Utilizing Windows Updates

Explanation: For corporations, you can also use Windows Server Update Service (WSUS) or System Center Configuration Manager (SCCM) to keep your systems updated. The advantage of using one of these two systems is that it allows you to test the patch, schedule the updates, and prioritize client updates. After you determine a patch is safe, you can enable it for deployment.

Term
9. What do you call multiple Windows updates that have been packaged together as one installation and are well tested?a) service packsb) cumulative packsc) critical update

d) optional update

Definition
Answer: aDifficulty: EasySection Reference: Utilizing Windows Updates

Explanation: A service pack is a tested cumulative set of hotfixes, security updates, critical updates, and updates, as well as additional fixes for problems found internally since the release of the product.

Term
10. What Windows feature notifies you when something tries to make changes to your computer without your knowledge?a) WDSb) NATc) Windows Defender

d) UAC

Definition
Answer: dDifficulty: MediumSection Reference: Utilizing User Account Control

Explanation: User Account Control (UAC) is a feature that started with Windows Vista and is included with Windows 7. UAC helps prevent unauthorized changes to your computer and, in doing so, helps protect your system from malware.

Term
11. What host firewall is included with Windows 7?a) Windows Firewallb) Windows Defenderc) Microsoft Protector

d) Microsoft Safety Net

Definition
Answer: aDifficulty: EasySection Reference: Using Windows Firewall

Explanation: Microsoft recommends that you always use Windows Firewall. However, because some security packages and antivirus packages include their own firewalls, you can choose to run an alternative firewall—but you should use only one firewall.

Term
12. What do you call unsolicited junk email?a) spamb) j-mailc) junkettes

d) Infected mail

Definition
Answer: aDifficulty: EasySection Reference: Protecting Your Email

Explanation: Email has become an essential service for virtually every corporation. Unfortunately, much of the email received by company employees consists of unsolicited messages called spam or junk email, some of which can carry malware and may lead to fraud or scams.

Term
13. What email validation system is designed to stop spam that uses source address spoofing?a) Foremost Relay Systemb) Sender Policy Frameworkc) Spam Checking Networking

d) Spoof Checker

Definition
Answer: bDifficulty: HardSection Reference: Dealing with Spam

Explanation: Sender Policy Framework (SPF) is an email validation system designed to stop spam that uses source address spoofing. SPF allows administrators to specify in DNS SPF records in the public DNS which hosts are allowed to send email from a given domain. If email for a domain is not sent from a host listed in the DNS SPF, it will be considered spam and blocked.

Term
14. What do spammers and hackers look for when they want to send email through your network?a) open SMTP serversb) open web serversc) open POP3 servers

d) open FTP servers

Definition
Answer: aDifficulty: MediumSection Reference: Relaying Email

Explanation: Simple Mail Transfer Protocol (SMTP), one of the primary email protocols, is used to transfer email from one server to another and is responsible for outgoing mail transport. SMTP uses TCP port 25. Although you may think your email servers function only for users to send and retrieve email, they also may be used to relay email. For example, web and application servers may relay email through their email servers, such as when you order something over the Internet and a confirmation email is sent to you.

Term
15. Which tab in Internet Explorer settings would you use to delete history and cookies?a) Generalb) Privacyc) Security

d) Advanced

Definition
Answer: aDifficulty: MediumSection Reference: Looking at Cookies and Privacy Settings

Explanation: When you use a browser to access the Internet, you may be revealing personal information and a great deal about your personality. Therefore, you need to take steps to ensure that this information cannot be read or used without your knowledge. A cookie is a piece of text stored by a user’s web browser. To clean out history, temporary files, and cookies, open the Internet Options and select the General tab.

Term
16. Which Internet Explorer zone is the least secure?a) Internet zoneb) local intranet zonec) trusted sites zone

d) restricted sites zone

Definition
Answer: bDifficulty: HardSection Reference: Examining Content Zones

Explanation: The trusted sites zone contains sites from which you believe you can download or run files without damaging your system. You can assign sites to this zone. The default security level for the trusted sites zone is Low, which means Internet Explorer will allow all cookies from websites in this zone to be saved on your computer and read by the website that created them. The next least secure is the local intranet, which is configured as Medium-Low.

Term
17. What technique is used to send you to a fake, but realistic-looking, website to verify your account information?a) spoofingb) smurfingc) man-in-the-middle

d) phishing

Definition
Answer: dDifficulty: MediumSection Reference: Phishing and PharmingExplanation: Phishing is a technique based on social engineering. With phishing, users are asked (usually through email or websites) to supply personal information in one of two ways:• By replying to an email asking for their username, password, and other personal information, such as account numbers, PINs, and Social Security number

• By navigating to a convincing-looking website that urges them to supply their personal information, such as passwords and account numbers

Term
18. ______________ is software that is designed to infiltrate or affect a computer system without the owner’s informed consent.
Definition
Answer: MalwareDifficulty: MediumSection Reference: Protecting Your Computer from Malware

Explanation: Malicious software, sometimes called malware, is software designed to infiltrate or affect a computer system without the owner’s informed consent. The term malware is usually associated with viruses, worms, Trojan horses, spyware, rootkits, and dishonest adware. As a network administrator or computer technician, you need to know how to identify malware, remove it, and protect a computer from it.

Term
19. A _____________ is a program that give someone remote, unauthorized control or a system or initiates an unauthorized task.
Definition
Answer: backdoorDifficulty: MediumSection Reference: Protecting Your Computer from Malware

Explanation: A backdoor is a program that gives someone remote, unauthorized control of a system or initiates an unauthorized task. Some backdoors are installed by viruses or other forms of malware. Other backdoors may be created by programs on commercial applications or with a customized application made for an organization.

Term
20. What are the best two things can you to do protect yourself from viruses and other forms of malware?
Definition
Answer: Keep Windows up-to-date with the newest security updates and use an up-to-date anti-virus software package.Difficulty: MediumSection Reference: Protecting Your Computer from Malware

Explanation: Some viruses, worms, rootkits, spyware, and adware gain access to a system by exploiting security holes in Windows, Internet Explorer, Microsoft Office, or some other software package. Therefore, the first step you should take to protect yourself against malware is to keep your system up-to-date with the latest service packs, security patches, and other critical fixes. Second, use an up-to-date antivirus software package.

Supporting users have an ad free experience!

What is a program that can copy itself and gain access to a computer in an unauthorized way?

What is a program that can copy itself and gain access to a computer in an unauthorized way?

What is a program that can copy itself and gain access to a computer in an unauthorized way?