1.1 Given a scenario, analyze indicators of compromise and determine the type of malware. Flashcards

1
Q

What type of malware could remove Explorer, Task Manager, and PowerShell from a user’s Windows computer?

A

A rootkit

A rootkit is backdoor malware that changes core system files and programming interfaces, so that local shell processes no longer reveal their presence.

Spyware is a program that monitors user activity and sends the information to someone else, with or without the user’s knowledge.

Adware is any type of software that displays commercial offers and deals. Adware software can have a negative impact on performance and can include accepting a long license agreement.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, held by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attacker installed malware that removed Explorer, Task Manager, and PowerShell from a user’s Windows computer. What type of malware did the attacker install on the victim host?

A

Rootkit

A rootkit is backdoor malware that changes core system files and programming interfaces, so that local shell processes no longer reveal their presence.

Spyware is a program that monitors user activity and sends the information to someone else, with or without the user’s knowledge.

Adware is any type of software that displays commercial offers and deals. Adware software can have a negative impact on performance and can include accepting a long license agreement.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, held by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a virus and a worm?

A

Viruses replicate by infecting applications, worms are self-contained.

A computer virus is malware that replicates and spreads from computer to computer, usually by “infecting” executable applications or program code. Worms are memory-resident viruses that replicate over network resources. A worm is self-contained; that is, it does not need to attach itself to another executable file.

Both computer viruses and worms replicate and spread from computer to computer throughout an infected network.

Viruses, not worms, replicate by infecting applications. Worms are self-contained and do not need to attach themselves to other applications.

Both computer viruses and worms replicate and spread from computer to computer throughout an infected network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During an internal investigation, a security specialist discovered a malicious backdoor script on a system administrator’s machine that executes if the admin’s account becomes disabled. What type of malware did the specialist discover?

A

A logic bomb

A logic bomb is a malicious program or script that is set to run under particular circumstances or in response to a defined event, such as disabling an account.

A worm is a type of virus that spreads through memory and network connections, rather than infecting files.

Cypto-malware is a class of ransomware that attempts to encrypt data files on any fixed, removable, and network drives.

A Remote Access Trojan functions as a backdoor, and allows the attacker to access the PC, upload files, and install software on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For an attacker to perform a Distributed Denial of Service (DDoS) attack, which of the following control programs would allow the hacker to compromise devices and turn them into zombies?

A

A bot

A botnet is a set of computers that has been infected by a control program called a bot, that enables attackers to exploit the computers to mount attacks.

A Remote Access Trojan (RAT) functions as backdoor, and allows the attacker to access the PC, upload files, and install software on it.

Spyware is a program that monitors user activity and sends the information to someone else. This can occur with or without the user’s knowledge.

A rootkit is backdoor malware that changes core system files and programming interfaces, so that local shell processes no longer reveal their presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker used social engineering to convince the victim to install a malicious program disguised as a driver update. The backdoor software allowed the attacker to remotely access the victim’s PC, upload files, and install software on it. What type of malicious software does this describe?

A

A Remote Access Trojan (RAT)

A RAT backdoor allows remote control to a computer and allows the attacker to access the PC, upload files, and install software on it.

Worms are memory-resident viruses that replicate over network resources. The primary effect of a worm infestation is to rapidly consume network bandwidth as the worm replicates. A worm may also be able to perform a Denial of Service (DoS) attack by crashing operating systems and servers.

Spyware is software that records information about a PC and its users, often installed without the user’s consent.

Ransomware is malware that tries to extort money from the victim, for instance, by appearing to lock the victim’s computer or by encrypting their files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A few end-users contacted the cyber security department about browser pop-ups on their computer, and explained that some websites they visit redirect them to other sites they did not intend to navigate to. The security team confirmed the pop-ups and noted modified DNS (Domain Name System) queries that go to nefarious websites hosting malware. What most likely happened to the users’ computers?

A

Spyware infected the computers.

One spyware technique is to spawn browser pop-up windows, as well as modify DNS queries attempting to direct the user to other websites, often of dubious provenance.

Ransomware is a type of Trojan malware that tries to extort money from the victim. It will display threatening messages, stating the computer will remain locked until the ransom is paid.

An adware browser plug-in displays commercial offers and deals. Some adware may exhibit spyware like behavior, by tracking the websites a user visits and displaying targeted ads, for instance.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attacker used a phishing email to successfully install a keylogger Trojan onto a victim’s computer, to steal confidential information when the user types information into the webform of a website. How can the user mitigate this threat?

A

Use a keyboard that encrypts keystrokes.

One way to mitigate the effects of keylogging is to use a keyboard that encrypts the keystroke signals before they are sent to the system unit.

A logic bomb is a malicious program or script that is set to run under particular circumstances or in response to a defined event.

Shoulder surfing refers to stealing a password or PIN (or other secure information) by watching the user type it.

Tailgating is a means of entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A script kiddie installed a backdoor on a victim’s computer that enabled the attacker to remotely access the PC, upload files, and install software on it. What kind of malware did the script kiddie install?

A

A Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An IT staff member used an administrator account to download and install a software application. After the user launched the .exe extension installer file, the user received pop-up ads, frequent crashes, slow computer performance, and strange services running when the staff member turns on the computer. What most likely happened to cause these issues?

A

The user installed Trojan horse malware.

A Trojan is a malicious program hidden within an innocuous-seeming piece of software. Usually, the Trojan tries to compromise the security of the target computer.

Rogueware is a fake antivirus, where a web pop-up claims to have detected viruses on the computer and prompts the user to initiate a full scan, which installs the attacker’s Trojan.

Adware is software that records information about a PC and its user, and usually displays pop-ups of commercial offers and deals.

Crypto-malware is a class of ransomware that attempts to encrypt data files. If the attack is successful, the user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An end-user installed an application and began receiving pop-up ads, frequent crashes, slow computer performance, and strange services running. Which of the following most likely describes what occurred to cause these problems?

A

The user installed Trojan horse malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An end-user installed an application and began receiving pop-up ads, frequent crashes, slow computer performance, and strange services running. Which of the following most likely describes what occurred to cause these problems?

A

The user installed Trojan horse malware.

A Trojan is a malicious program hidden within an innocuous-seeming piece of software. Usually, the Trojan tries to compromise the security of the target computer.

Rogueware is a fake antivirus, where a web pop-up claims to have detected viruses on the computer and prompts the user to initiate a full scan, which installs the attacker’s Trojan.

Adware is software that records information about a PC and its user, and usually displays pop-ups of commercial offers and deals.

Crypto-malware is a class of ransomware that attempts to encrypt data files. If the attack is successful, the user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a user’s computer becomes infected with a botnet, which of the following can this compromise allow the attacker to do? (Select more than one)

A

Launch a Distributed Denial of Service (DDoS) attack

Launch a mass-mail spam attack

Establish a connection with a Command and Control server

RAT backdoor applications can allow the attacker to use the computer in a botnet to launch Distributed Denial of Service (DoS) attacks.

RAT backdoor applications can allow the user to use the computer in a botnet to launch mass-mail spam attacks.

A RAT must establish a connection from the compromised host to a Command and Control (C2 or C&C) host or network operated by the attacker.

Tailgating is a social engineering technique to gain access to a building by following someone else (or persuading them to “hold the door”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A script kiddie installed a backdoor on a victim’s computer that enabled the attacker to remotely access the PC, upload files, and install software on it. What kind of malware did the script kiddie install?

A

A Remote Access Trojan (RAT)

A RAT backdoor allows remote control to a computer and allows the attacker to access the PC, upload files, and install software on it.

Worms are memory-resident viruses that replicate over network resources. The primary effect of a worm infestation is to rapidly consume network bandwidth as the worm replicates. A worm may also be able to perform a Denial of Service (DoS) attack by crashing operating systems and servers.

Spyware is software that records information about a PC and its users, often installed without the user’s consent.

Ransomware is malware that tries to extort money from the victim, for instance, by appearing to lock the victim’s computer or by encrypting their files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attacker installed malware that removed Explorer, Task Manager, and PowerShell from a user’s Windows computer. What type of malware did the attacker install on the victim host?

A

Rootkit

A rootkit is backdoor malware that changes core system files and programming interfaces, so that local shell processes no longer reveal their presence.

Spyware is a program that monitors user activity and sends the information to someone else, with or without the user’s knowledge.

Adware is any type of software that displays commercial offers and deals. Adware software can have a negative impact on performance and can include accepting a long license agreement.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, held by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A cyber security department received alerts about browser pop-ups on users’ computers. After further investigation, the security analysts discovered that websites they visit on the compromised machines redirect them to malicious websites due to modified DNS (Domain Name System) queries. Which of the following did the computers most likely get infected with?

A

Spyware

One spyware technique is to spawn browser pop-up windows, as well as modify DNS queries attempting to direct the user to other websites, often of dubious provenance.

Ransomware is a type of Trojan malware that tries to extort money from the victim. It will display threatening messages, stating the computer will remain locked until the ransom is paid.

An adware browser plug-in displays commercial offers and deals. Some adware may exhibit spyware-like behavior, by tracking the websites a user visits and displaying targeted ads, for instance.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.

17
Q

An attacker performed a Distributed Denial of Service (DDoS) attack by compromising multiple zombie (agent) PCs with DoS tools. What is the control program that enables the attacker to exploit these computers to perform the DDoS attack?

A

A bot

A botnet is a set of computers that has been infected by a control program called a bot, that enables attackers to exploit the computers to mount attacks.

A Remote Access Trojan (RAT) functions as a backdoor, and allows the attacker to access the PC, upload files, and install software on it.

Spyware is a program that monitors user activity and sends the information to someone else. This can occur with or without the user’s knowledge.

A rootkit is backdoor malware that changes core system files and programming interfaces, so that local shell processes no longer reveal their presence.

18
Q

What type of malware could remove Explorer, Task Manager, and PowerShell from a user’s Windows computer?

A

A rootkit

A rootkit is backdoor malware that changes core system files and programming interfaces, so that local shell processes no longer reveal their presence.

Spyware is a program that monitors user activity and sends the information to someone else, with or without the user’s knowledge.

Adware is any type of software that displays commercial offers and deals. Adware software can have a negative impact on performance and can include accepting a long license agreement.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, held by the attacker.

19
Q

If a user’s device becomes infected with crypto-malware, which of the following is the best way to mitigate this compromise?

A

Have up-to-date backups of the encrypted files.

The crypto-malware class of ransomware attempts to encrypt data files on any fixed, removable, and network drives. If successful, this sort of attack is extremely difficult to mitigate, unless the user has up-to-date backups of the encrypted files.

With crypto-malware, a user will be unable to access the files without obtaining the private encryption key, which is held by the attacker until the ransom is paid, hopefully. However, paying the ransom will not help mitigate a crypto malware infection.

While viruses can be removed with antivirus, if the files are encrypted, chances are they will not be recoverable.

Keeping operating systems and applications up-to-date before an infection is vital to prevent getting infected in the first place.

20
Q

Before installing a browser plug-in, a user accepted a 30-page license agreement which stated that their data would be monitored, and their activity would be sent to a third party. What type of software did the user install?

A

Adware

Adware is a type of software or browser plug-in that is similar to spyware. If the user accepts the data use policy and the program generally behaves like any other commercial software installation, then it’s adware, not spyware.

Spyware is a program that monitors user activity and sends the information to someone else. This can occur with or without the user’s knowledge.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, held by the attacker.

A rootkit is backdoor malware that changes core system files and programming interfaces, so that local shell processes, no longer reveal their presence.

21
Q

An end-user installed an application and began receiving pop-up ads, frequent crashes, slow computer performance, and strange services running. Which of the following most likely describes what occurred to cause these problems?

A

The user installed Trojan horse malware.

A Trojan is a malicious program hidden within an innocuous-seeming piece of software. Usually, the Trojan tries to compromise the security of the target computer.

Rogueware is a fake antivirus, where a web pop-up claims to have detected viruses on the computer and prompts the user to initiate a full scan, which installs the attacker’s Trojan.

Adware is software that records information about a PC and its user, and usually displays pop-ups of commercial offers and deals.

Crypto-malware is a class of ransomware that attempts to encrypt data files. If the attack is successful, the user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.

22
Q

An IT staff member used an administrator account to download and install a software application. After the user launched the .exe extension installer file, the user received pop-up ads, frequent crashes, slow computer performance, and strange services running when the staff member turns on the computer. What most likely happened to cause these issues?

A

The user installed Trojan horse malware.

A Trojan is a malicious program hidden within an innocuous-seeming piece of software. Usually, the Trojan tries to compromise the security of the target computer.

Rogueware is a fake antivirus, where a web pop-up claims to have detected viruses on the computer and prompts the user to initiate a full scan, which installs the attacker’s Trojan.

Adware is software that records information about a PC and its user, and usually displays pop-ups of commercial offers and deals.

Crypto-malware is a class of ransomware that attempts to encrypt data files. If the attack is successful, the user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.

23
Q

What is the difference between a virus and a worm?

A

Viruses replicate by infecting applications, worms are self-contained.

STUDY!

A computer virus is malware that replicates and spreads from computer to computer, usually by “infecting” executable applications or program code. Worms are memory-resident viruses that replicate over network resources. A worm is self-contained; that is, it does not need to attach itself to another executable file.

Both computer viruses and worms replicate and spread from computer to computer throughout an infected network.

Viruses, not worms, replicate by infecting applications. Worms are self-contained and do not need to attach themselves to other applications.

Both computer viruses and worms replicate and spread from computer to computer throughout an infected network.

24
Q

A few end-users contacted the cyber security department about browser pop-ups on their computer, and explained that some websites they visit redirect them to other sites they did not intend to navigate to. The security team confirmed the pop-ups and noted modified DNS (Domain Name System) queries that go to nefarious websites hosting malware. What most likely happened to the users’ computers?

A

Spyware infected the computers.

One spyware technique is to spawn browser pop-up windows, as well as modify DNS queries attempting to direct the user to other websites, often of dubious provenance.

Ransomware is a type of Trojan malware that tries to extort money from the victim. It will display threatening messages, stating the computer will remain locked until the ransom is paid.

An adware browser plug-in displays commercial offers and deals. Some adware may exhibit spyware like behavior, by tracking the websites a user visits and displaying targeted ads, for instance.

Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.

25
Q

A support specialist runs a virus scan and finds a user’s computer to be compromised with a Trojan. The user suspects that the Trojan got installed while shopping online, and the specialist feels that the attacker likely captured transaction information. The specialist suggests which method to mitigate this type of attack in the future?

A

Use keystroke encryption software

26
Q

An attacker used social engineering to convince the victim to install a malicious program disguised as a driver update. The backdoor software allowed the attacker to remotely access the victim’s PC, upload files, and install software on it. What type of malicious software does this describe?

A

A Remote Access Trojan (RAT)

27
Q

During an internal investigation, a security specialist discovered a malicious backdoor script on a system administrator’s machine that executes if the admin’s account becomes disabled. What type of malware did the specialist discover?

A

A logic bomb