When describing malware, what is a difference between a virus and a worm?

  1. Malware vs. Viruses: What’s the Difference
  2. What's the Difference Between a "Trojan Horse", a "Worm", and a "Virus"?
  3. Module 14: Common Threats and Attacks Quiz Answers
  4. Module 14: Common Threats and Attacks Quiz Answers
  5. Malware vs. Viruses: What’s the Difference
  6. What's the Difference Between a "Trojan Horse", a "Worm", and a "Virus"?


Download: When describing malware, what is a difference between a virus and a worm?
Size: 65.52 MB

Malware vs. Viruses: What’s the Difference

23414352941 Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/phishing Icons/32/01 Security/Scams Icons/32/01 Security/hacking Icons/32/01 Security/Security-tips Icons/32/01 Privacy/Privacy-tips Icons/32/01 Performance/Software Icons/32/01 Privacy/Identity-Protection Icons/32/01 Privacy/Digital-life Icons/32/01 Performance/Performance-tips Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/45/01 Security/phishing Icons/45/01 Security/Scams Icons/45/01 Security/hacking Icons/45/01 Security/Security-tips Icons/45/01 Privacy/Privacy-tips Icons/45/0...

What's the Difference Between a "Trojan Horse", a "Worm", and a "Virus"?

There’s no shortage of confusing terminology in the computer biz. With the advent of The good news is that it’s not really that difficult; in fact, you needn’t understand most of the details (besides, not everyone agrees on the exact meaning of each definition). Let’s run down a few terms. Malware The most important term to know is malicious soft ware. The name says it all: malware is any software that has malicious intent — destroy data, send You’ll find malware used as a catch-all term for all flavors and varieties of software that intend some kind of harm. Virus In the human body, a When applied to computers, the term “ • A computer virus replicates itself in some way so as to spread within the computer, usually injecting itself into other programs within the computer. • A computer virus makes the infected computer “sick”. In the computer sense, “sick” can mean poor performance, crashes, lost files and data, or more. Very technically, the term virus does not necessarily imply that a piece of malicious software will replicate itself to other systems. In general use, it’s assumed. Spyware Worm A worm is a program that replicates itself to other computers. It does so by infecting media, such as Very technically, again, the term worm does not necessarily imply malicious intent or behavior, other than the replication. In practice, malicious intent is generally assumed. Trojan Horse A A trojan horse is not a virus per se, but it may carry them. For example, there are trojans ...

Module 14: Common Threats and Attacks Quiz Answers

1. Which is an example of social engineering? • an unidentified person claiming to be a technician collecting user information from employees • a computer displaying unauthorized pop-ups and adware • an anonymous programmer directing a DDoS attack on a data center • the infection of a computer by a virus carried by a Trojan Explanation: A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering. 2. What is a significant characteristic of virus malware? • Virus malware is only distributed over the Internet. • Once installed on a host system, a virus will automatically propagate itself to other systems. • A virus can execute independently of the host system. • A virus is triggered by an event on the host system. Explanation: A virus is malicious code that is attached to a legitimate program or executable file, and requires specific activation, which may include user actions or a time-based event. When activated, a virus can infect the files it has not yet infected, but does not automatically propagate itself to other systems. Self-propagation is a feature of worms. In addition to being distributed over the Internet, viruses are also spread by USB memory sticks, CDs, and DVDs. 3. Which access attack method involves a software program that attempts to dis...

Module 14: Common Threats and Attacks Quiz Answers

1. Which is an example of social engineering? • an unidentified person claiming to be a technician collecting user information from employees • a computer displaying unauthorized pop-ups and adware • an anonymous programmer directing a DDoS attack on a data center • the infection of a computer by a virus carried by a Trojan Explanation: A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering. 2. What is a significant characteristic of virus malware? • Virus malware is only distributed over the Internet. • Once installed on a host system, a virus will automatically propagate itself to other systems. • A virus can execute independently of the host system. • A virus is triggered by an event on the host system. Explanation: A virus is malicious code that is attached to a legitimate program or executable file, and requires specific activation, which may include user actions or a time-based event. When activated, a virus can infect the files it has not yet infected, but does not automatically propagate itself to other systems. Self-propagation is a feature of worms. In addition to being distributed over the Internet, viruses are also spread by USB memory sticks, CDs, and DVDs. 3. Which access attack method involves a software program that attempts to dis...

Malware vs. Viruses: What’s the Difference

23414352941 Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/phishing Icons/32/01 Security/Scams Icons/32/01 Security/hacking Icons/32/01 Security/Security-tips Icons/32/01 Privacy/Privacy-tips Icons/32/01 Performance/Software Icons/32/01 Privacy/Identity-Protection Icons/32/01 Privacy/Digital-life Icons/32/01 Performance/Performance-tips Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/45/01 Security/phishing Icons/45/01 Security/Scams Icons/45/01 Security/hacking Icons/45/01 Security/Security-tips Icons/45/01 Privacy/Privacy-tips Icons/45/0...

What's the Difference Between a "Trojan Horse", a "Worm", and a "Virus"?

There’s no shortage of confusing terminology in the computer biz. With the advent of The good news is that it’s not really that difficult; in fact, you needn’t understand most of the details (besides, not everyone agrees on the exact meaning of each definition). Let’s run down a few terms. Malware The most important term to know is malicious soft ware. The name says it all: malware is any software that has malicious intent — destroy data, send You’ll find malware used as a catch-all term for all flavors and varieties of software that intend some kind of harm. Virus In the human body, a When applied to computers, the term “ • A computer virus replicates itself in some way so as to spread within the computer, usually injecting itself into other programs within the computer. • A computer virus makes the infected computer “sick”. In the computer sense, “sick” can mean poor performance, crashes, lost files and data, or more. Very technically, the term virus does not necessarily imply that a piece of malicious software will replicate itself to other systems. In general use, it’s assumed. Spyware Worm A worm is a program that replicates itself to other computers. It does so by infecting media, such as Very technically, again, the term worm does not necessarily imply malicious intent or behavior, other than the replication. In practice, malicious intent is generally assumed. Trojan Horse A A trojan horse is not a virus per se, but it may carry them. For example, there are trojans ...