1.1 Malware Flashcards

Given a scenario, analyze indicators of compromise and determine the type of malware

1
Q

Virus

A

Viruses are programs that are designed to spread from one system to another through self-replication and to perform any wide range of malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crypto-Malware

A

Crypto-Malware is any form of malware that uses cryptography as weapon of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomeware

A

Ransomeware is a form of malware that aims to take over a computer system in order to block its use while demanding payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms

A

Worms are designed to exploit a single flaw in a system (operating system, protocol, service, or application) and then use that flaw to replicate themselves to other systems with the same flaw.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan Horses

A

A Trojan Horse is a form if malicious software that is disguised as something useful or legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkits

A

A rootlet is a type of malicious code that fools the OS into thinking that active processes and files don’t exist. Rootkits render a compromised system completely untrustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keyloggers

A

A keylogger is a form of malware that records the keystrokes typed into a system’s keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware & Adware

A

Spyware gathers information about users and may employ that information to customize advertisements or steal identities. Adware gathers information about users and uses it to direct advertisements to the user. Both spyware and adware are usually unwanted software that gathers information without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Botnets

A

A botnet is a network of robots or malicious software agents controlled by a hacker in order to launch massive attacks against targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

A Remote-Access Trojan (RAT) is a form of malicious code that grants an attacker some level of remote-control access to a compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

A logic Bomb is a form of malicious code that remains dormant until a triggering event occurs. The triggering event can be a specific time and date, the launching of a specific program, or the accessing of a specific URL =.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backdoor Attacks

A

There are two types of backdoor attacks: a developer-installed access method that bypass any and all security restrictions, or a hacker-installed remote access client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Understanding Malicious Code

A

The best countermeasure to viruses an other malicious code is an anti-virus scanner that is updated regularly ad that monitors all local storage devices, memory, and communication pathways for malicious activity. Other countermeasures include avoiding downloading software from the internet, not opening email attachments, and avoiding the use of removable media from other environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly