Pass your certification exam. Faster. Guaranteed.

Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam.

BASIC

Comprehensive practice exam engine!

  • Unlimited access to thousands of practice questions
  • Exam readiness score
  • Smart reinforcement

PRO

All features in the FREE plan, plus:

  • Focused training ensures 100% exam readiness
  • Personalized learning plan
  • Align exam engine to your current baseline knowledge
  • Eliminate wasted study time
  • Exam pass guarantee
  • And much more

Malware Transcription

Welcome to our Malware Module. There are several different types of malware or malicious software that you should be familiar with, including viruses, worms, logic bombs, and Trojans. Viruses are small applications or strings of code that infect applications. Viruses require a host application that they embed themselves in and they cannot replicate on their own.

There are several different types of virus propagation techniques. Master boot record viruses will attack the master boot record, which is used by the computer to load operating systems. These types of attacks are then loaded before the operating system loads and therefore are very difficult to get rid of.

File infector viruses infect executable files like exe files. They replace part of the file or the entire file with malicious code that then executes when the user runs the executable. Macro viruses will exploit the scripting functionality commonly used in applications such as Microsoft Word. Finally, service injection viruses inject themselves into trusted run-time processes.

There are several different types of viruses. Multipartite viruses use more than one propagation technique in an attempt to increase their success. Stealth viruses will attempt to hide themselves by modifying different components of the operating systems. Polymorphic viruses will modify their code or signature when infecting a new system.

This helps them to try to avoid detection from antivirus software. Encrypted viruses will load and decrypt themself once they are on the victim's system. A hoax occurs when false information is provided about virus threats in order to waste time and resources. Worms are slightly different than viruses, because they are able to self propagate.

There is no need for a host application and there is no human interaction required. You should remember for the CISSP examination, that worms do not need a host application and that they are able to self propagate, where viruses are not. Some known examples of worms include the Code Red worm, the Stuxnet virus, and the Internet worm.

Logic bombs are pieces of code that are intentionally inserted into a piece of software that can create so type of malicious activity when certain conditions are met. These are often placed by disgruntled employees in order to destroy their work after they leave the company. Logic bombs can also serve as a trigger for loading other types of malicious software.

You should be familiar with logic bombs for the CISSP examination. Remember that they are designed to activate when certain conditions are met, such as after a program is executed a certain number of times or after a certain date. Trojan horses are computer programs that appear to have a useful function but they have hidden and generally malicious functions inside them.

There are several different types of Trojan horses, including fake antivirus applications, games, and utilities or productivity tools. The benign component may actually provide the service that is advertised, or it may not work at all. Trojan horses are commonly downloaded when individuals are illegally downloading software from file sharing networks.

This concludes our malware module. Thank you for watching.

Included in all plans.

1000's of practice test questions

Classified by skill and ranked by difficulty. Choose to answer questions in STUDY MODE to review and you go.

Exam Readiness Score

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Smart Reinforcement

Don’t forget what you’ve just studied! Use the intelligent reinforcement questions to stay fresh.

THANK YOU! Just bloody thank you! I’m doing the CEH minor at my college and well...I’ve learned more from this site in a few hours than I’ve learned from my school in 9 weeks about the subject. Keep up the good work!

PRO Membership Benefits.

Personalized Learning Plan

Skillset’s Exam Engine continuously assesses your knowledge and determines when you are ready take and pass your exam. When Skillset learns that there is a gap between your knowledge and what you need to know to pass, we present you with a focused training module that gets you up to speed quickly. No fluff! Find your knowledge gaps and fill them.

Exam Pass Guarantee

Skillset is confident that we can help anyone pass their exam. If you reach 100% readiness, and you do not pass your exam, we will refund you plus pay for a replacement exam voucher. That’s how powerful our learning system is, we can offer this guarantee and stand behind our products with this no risk to you guarantee. See terms and conditions.

Eliminate Wasted Study Time

Don’t waste time studying concepts you have already mastered. Focus on what you need to know to pass. The Skillset Competency Diagnostic aligns our Exam Engine and Learning Plan to your baseline knowledge. This saves an average of 31% of the time required to prep for a professional certification exam.

Coming Soon - Simulated Exam

More PRO benefits are being built all the time!