Which of the following is considered one of the biggest sources of malware (malicious software)?

Match each item with a statement below.

* An encryption technology for individual files and folders that can be enabled by users

* Malicious software designed to perform unauthorized acts on your computer

* The security process that records the occurrence of specific operating system events in the Security log

* A feature in Windows 10 that elevates user privileges only when required

* A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification

* A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed

* A collection of settings to control password characteristics such as length and complexity

* Anti-malware software included with Windows 10

* A command-line tool that is used to apply, export, or analyze security templates

Which of the following three are common types of malware quizlet?

Common types of malware include virus, worm, trojan horse, rootkit, spyware, and adware.

Which of the following is an example of malicious code?

The most common examples of malicious code out there include computer viruses, Trojan horses, worms, bots, spyware, ransomware, and logic bombs.

What type of malicious software records every keystroke is made?

Short for “keystroke logging,” a keylogger is a type of malicious software that records every keystroke you make on your computer. Keyloggers are a type of spyware — malware designed to spy on victims. Because they can capture everything you type, keyloggers are one of the most invasive forms of malware.

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software such as a virus?

A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.