Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Core 2
Core 2
By: Andrew Boos-Hartig
Acronyms, Steps For malware removal2Decks225Flashcards1Learner -
Computer Science Y1 141
Computer Science Y1 141
By: Sam Brereton
Week 1 - Introduction, Computing Professional Responsibilities, Week 2 - System Development Life Cycle, Week 3 - Requirements ...19Decks284Flashcards1Learner -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management ...18Decks111Flashcards10Learners -
C394
C394
By: Alex Lau
Windows 7, Windows 8, Windows 10 ...20Decks96Flashcards1Learner -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes. ...24Decks640Flashcards47Learners -
Computer Security
Computer Security
By: Sherissa Pinnock
Lecture 2, Cryptography, Authentication ...5Decks56Flashcards1Learner -
Computer Science
Computer Science
By: Libby Simpson
Necessary vocan for describing programming, CPU and Memory, Hardware and Software ...7Decks157Flashcards1Learner -
Computing
Computing
By: Ethan Turner
Computer Systems and CPU, Von Neumann Architecture, The Fetch-Decode-Execute Cycle ...19Decks233Flashcards3Learners -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
IT
IT
By: Tarik - Greatest of All Time
Powerpoint 1, Hardware Malfunctions, Misuse ...11Decks56Flashcards1Learner -
IS4560 HACKING AND COUNTERMEASURES
IS4560 HACKING AND COUNTERMEASURES
By: Barbara Crable
IS4560 CH 1 "Evolution of Hacking", IS4560 CH 2 TCP/IP Review, IS4560 CH 3 Cryptographic Concepts ...15Decks160Flashcards24Learners -
BTEC cybersecurity
BTEC cybersecurity
By: baconblock gt
keywords for ports and malware1Decks30Flashcards2Learners -
Security + 601
Security + 601
By: Carlos Rosado
Attacks, Threats, Vulnerabilities, Malware Variants, Types of Attacks ...18Decks265Flashcards1Learner -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks ...16Decks195Flashcards1Learner -
Sistemi e Reti
Sistemi e Reti
By: SARA MATTIATO
Indirizzi IPv4, Indirizzi IPv6, Protocolli e Servizi ...14Decks106Flashcards2Learners -
Cybersecurity
Cybersecurity
By: Machias Boschman
Basisbegrippen van cybersecurity, Malware en Kwaadaardige code, Misleiding en oplichting ...6Decks70Flashcards1Learner -
C2
C2
By: Randy Michael
Windows System Editing Tools, Windows 10 version Recommendations, Malware definitions ...12Decks69Flashcards1Learner -
CompTIA A+ Software
CompTIA A+ Software
By: junk emails
Operating System Management (Chapter 1), Configuring And Installing The OS (Chapter 2), Tools To Troubleshoot And Maintain OS (Chapter 3) ...9Decks282Flashcards1Learner -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards15Learners -
1102 Exam
1102 Exam
By: Mecca Ahmad
Linux Commands, Windows Commands, Malware ...7Decks65Flashcards1Learner -
CompTIA A+ 1102
CompTIA A+ 1102
By: RICARDO VILLETA
CompTIA A+ 1102 Windows (Set 1), CompTIA A+ 1102 Windows Networking, CompTIA A+ 1102 Windows (Set 2) ...18Decks373Flashcards1Learner -
Firewall
Firewall
By: Leslie Book
Firewall Basics, Identify and Malware, CLI Commands ...4Decks66Flashcards1Learner -
BTEC IT Compnent 3
BTEC IT Compnent 3
By: George Derrick
Setting Up Ad Hoc Networks, Network Security And Performance, Issues Afftecting Network Availability ...7Decks32Flashcards3Learners -
CompTIA Security+ Cert Prep: 1 Threats, Attacks, and Vulnerabilities
CompTIA Security+ Cert Prep: 1 Threats, Attacks, and Vulnerabilities
By: Joe Fu
1. Malware, 6. Vulnerability Types, 7. Vulnerability Scanning ...8Decks112Flashcards2Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards10Learners -
Comptia A+ Core 2
Comptia A+ Core 2
By: Andrew Dieppa
1.1 An Overview of Windows, 1.1 - Windows Features, 1.1 - Windows Upgrades ...69Decks528Flashcards1Learner -
Security+ 501
Security+ 501
By: maria spinosa
1.1 Malware, 2.2, 2.1 ...8Decks139Flashcards1Learner -
IT-Sicherheit
IT-Sicherheit
By: Lucas Lahr
Informationssicherheit: Grundbegriffe und Definitionen, Authentifizierung, Passwörter ...24Decks281Flashcards1Learner -
security +
security +
By: larry neville
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure ...12Decks238Flashcards2Learners -
Ceh
Ceh
By: m m
Ports, nMap commands, HPing switches ...23Decks131Flashcards5Learners