1.1 Malware Flashcards

Given a scenario, analyze indicators of compromise and determine the type of malware

1
Q

Piece of Software that gets onto a system

  • Attach to other files
  • Propagate
  • Spread to other devices
  • Active
A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that attacks a computer by restricting the user’s access to files stored in the computer.

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Locks user system until user pays the attacker in some form

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can replicate and spread without any human activation

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software that looks legitimate but has ulterior motives

-Not self propagated. Must have been installed on System by a user

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that escalates privileges to execute other things on a computer

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Records keystrokes to collect information

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

software that automatically displays or downloads advertising material (often unwanted) when a user is online

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Form of Malware that is hidden and tracks user activity

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can be programmed/hacked to break into user accounts, scan the internet for contact information, to send spam, or perform other harmful acts.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote Access Trojan

-Must be activated remotely by someone

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Program that is present on a system but does not do anything until triggered by an event

  • Does not Propagate
  • Example: Logic bomb activates if a disgruntled employee’s account is deactivated.
A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware type that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to remotely issue system commands and update malware

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly