Malicious Code
Related domains:
2.0 Threats, Vulnerabilities, and Mitigations 22%
Related sub-domains
2.4 Given a scenario, analyze indicators of malicious activity
Survey
Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.
Questions
While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.
How is malware defined in Comptia Security+ What are the different types of types of malware? What are the attributes that help distinguish between types of malware? What are the different IoCs for each malware type? What is IRC? What are the different mitigation methods for malware? How do the different mitigations achieve their goal? What is the difference between spyware and bloatware? And how are they similar? What are the two components of viruses? What are the different virus variates? Why are fileless viruses dangeours? How could malware run on you systems?
Read
Focus on answering the questions, come up with more as necessary.
Write
Annotate thoughts and ideas Answer questions
Recite
Go back over appropriate sections
Reflect
How does this currently fit with what you know? How would you teach this to someone else?