10.1 What are three broad mechanisms that malware can use to propagate?
10.2 What are four broad categories of payloads that malware may carry?
10.3 What are typical phases of operation of a virus or worm?
10.4 What mechanisms can a virus use to conceal itself?
10.5 What is the difference between machine-executable and macro viruses?
10.6 What means can a worm use to access remote systems to propagate?
10.7 What is a “drive-by-download” and how does it differ from a worm?
10.8 What is a “logic bomb”?
10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
10.10 List some of the different levels in a system that a rootkit may use.
10.11 Describe some malware countermeasure elements.
10.12 List three places malware mitigation mechanisms may be located.
10.13 Briefly describe the four generations of antivirus software.
10.14 How does behavior-blocking software work?

113 comments on “Broad mechanisms that malware can use to propagate

  1. Good for you for speaking the truth & being brave enough to share. I am sure it was not easy, but I am ALSO sure this article will help someone else who needs it. I also think that anyone who says anything nasty about this article MAY need to take a look at themselves.Thanks a lot for sharing such a great piece of article! I found it a good helpful write-up with a good sound and explanation. Here I have seen some valuable ideas that are definitely helpful for inspiring. Please keep sharing more updates!Great article! That’s a great point – CBM3D. Using visuals helps make it more readily availablefor our ESL students.

Leave a Reply

Your email address will not be published. Required fields are marked *