Threats and vulnerabilities
Area 2: Security, Confidentiality, and Privacy (35-45%)
Your Progress
0 of 97 questions attempted
Topics
- Malware, phishing, and social engineering
- Network-based attacks
- Vulnerability assessment and management
Study Frameworks
Malware Types and Characteristics
| Type | Behavior | Propagation | Key Characteristic |
|---|---|---|---|
| Virus | Attaches to legitimate programs | Requires user action (execute infected file) | Cannot self-replicate without host program |
| Worm | Self-replicating standalone program | Spreads automatically across networks | No host program needed; consumes bandwidth |
| Trojan | Disguised as legitimate software | Requires user to install | Creates backdoors; no self-replication |
| Ransomware | Encrypts victim's files | Phishing, exploit kits, RDP | Demands payment for decryption key |
| Spyware | Monitors user activity secretly | Bundled with software, drive-by download | Keyloggers, screen capture, credential theft |
| Rootkit | Hides deep in OS to maintain access | Exploits or bundled with other malware | Extremely difficult to detect; modifies OS kernel |