Trojans exploit user trust. Worms exploit unpatched vulnerabilities. Rootkits exploit the operating system itself. A sophisticated attack chain uses all three.
Beyond Basic Viruses: The Modern Threat Landscape
The lines between malware types often blur in real attacks. A single intrusion may involve a Trojan for initial delivery, a Rootkit establishing persistence in the kernel, and a Ransomware payload deployed weeks later after the attacker has mapped the entire network. SY0-701 tests you on the defining behavior of each individual type.
Malware Behavioral Profiles
Malware Identification Table for Exam Day
| Malware Type | Primary Motive | Self-Replicates? | Key Identifying Behavioral Marker |
|---|---|---|---|
| Virus | System damage | Yes (needs host file) | Infects and modifies executable files |
| Worm | Mass propagation | Yes (standalone) | Spreads autonomously over network without user action |
| Trojan | Initial access / backdoor | No | Disguised as legitimate software, user must execute |
| RAT | Persistent remote control | No | Covert C2 connection, often blends into HTTPS traffic |
| Rootkit | Stealth & persistence | No | Hides processes/files from OS tools and antivirus |
| Ransomware | Financial extortion | Varies | Encrypts user files, demands cryptocurrency ransom |
| Logic Bomb | Delayed sabotage | No | Dormant until trigger condition; often insider threat |
| Spyware | Data exfiltration | No | Silently monitors keystrokes, clipboard, browser history |
| Adware | Ad revenue | No | Injects unwanted advertising into browser sessions |
Real-World Scenario
An analyst notices that an endpoint's antivirus shows no threats, but the SIEM alerts on outbound traffic from the machine on Port 443 at irregular intervals with unusually consistent packet sizes — suggesting encrypted C2 beaconing. Neither the task manager nor netstat on the machine shows the responsible process. This behavioral pattern (OS blindness + covert C2) indicates a kernel-level rootkit paired with a RAT. The correct response is to take a forensic RAM dump and analyze it with an offline tool like Volatility — not run another scan on the infected host.
- Trojan: disguised, requires user execution, no replication. RAT = Trojan with persistent C2 backdoor.
- Worm: fully autonomous, exploits vulnerabilities, no human needed — 'weekend spread' is the exam clue.
- Ransomware: encrypts files + demands payment. Double extortion = exfiltrates data first.
- Rootkit: kernel-level, makes OS lie to its own security tools. Requires external forensic analysis.
- Logic Bomb: dormant until trigger condition — classic insider threat mechanism.
Ready to test your knowledge?
Take a free full-length practice exam with 90 questions and instant feedback.
Start Practice Exam