1.1 Analyze indicators of compromise and determine the type of malware. Flashcards

1
Q

Viruses

A

A type of malware designed to replicate and spread from computer to computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crypto-Malware

A

Class of ransomware which encrypts data files. The user will be unable to access there files without the private encryption key. Only mitigation technique is to have up-to-date backups of encrypted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomware

A

A type of Trojan malware that tries to extort money from the victim. Uses payment methods like wire transfer, gift cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worm

A

A memory-resident virus that replicates over a network. Rapidly consumes network bandwidth as the worm replicates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

A malware code concealed within an application package that the user thinks is benign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAT

A

A backdoor Trojan. Mimics the functionality of legitimate remote control programs. Once installed, the attacker can access the PC, upload files and install software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backdoor

A

RAT’s. Backdoors may be created for testing or by misconfiguraion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkit

A

A class of backdoor malware that is hard to detect and remove. Rootkits change core system files and programming interfaces, so that shell processes and port scanning tools no longer reveal their presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keylogger

A

Spyware/Trojans that attempt to steal information via keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adware

A

Any type of software or browser plug-in that displays commercial offers and deals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

A program that monitors user activity and sends the information to someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logic Bomb

A

Malware that is configured to run after a user event. I.e. a disgruntled sys admin who leaves a scripted trap that runs after he is terminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly