17-C Flashcards

1
Q

What is malware?

A

Software that does something bad from the perspective of the system owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the main categories of malware according to vector?

A
  • Viruses
  • Boot sector viruses
  • Trojans
  • Worms
  • Fileless malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

Concealed within the code of an executable process image stored as a file on disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do boot sector viruses infect?

A

The boot sector code or partition table on a disk drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a Trojan.

A

Malware concealed within an installer package for software that appears to be legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do worms spread?

A

By replicating between processes in system memory and exploiting vulnerable client/server software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is fileless malware?

A

Malicious code that uses the host’s scripting environment to create new processes in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a backdoor in the context of malware?

A

A method allowing a threat actor to access a PC and upload/exfiltrate data files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the primary functions of spyware?

A
  • Perform browser reconfigurations
  • Monitor local application activity
  • Take screenshots
  • Activate recording devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a keylogger?

A

Spyware that records keystrokes to steal confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a rootkit?

A

Malware that operates with high privileges, often concealing its presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ransomware?

A

A type of malware that tries to extort money from the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is crypto-ransomware?

A

Ransomware that encrypts files, making them inaccessible without a decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cryptojacking?

A

The hijacking of a host’s resources to perform cryptocurrency mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List some performance symptoms of malware infection.

A
  • Computer fails to boot
  • Slow performance at startup
  • Inability to access network or internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are common application symptoms of malware?

A
  • Security-related applications stop working
  • OS updates fail
  • Applications crash frequently
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What file system errors might indicate malware infection?

A
  • Missing or renamed files
  • Additional executable files with similar names to system files
  • Altered file permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does redirection in a browser indicate?

A

When a user is sent to a different page than intended, often mimicking the target page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What causes certificate warnings in a browser?

A
  • Self-signed certificates
  • FQDN mismatch
  • Expired or revoked certificates
20
Q

What is the first step in the best practices for malware removal?

A

Investigate and verify malware symptoms

21
Q

Fill in the blank: A key component of malware removal is to _______ infected systems.

A

[quarantine]

22
Q

True or False: Most malware is discovered via manual inspection rather than automated scanning.

23
Q

What should be done after remediating infected systems?

A

Enable System Restore and create a restore point in Windows

24
Q

What is the purpose of enabling System Restore in Windows?

A

To create restore points that allow users to revert their system to a previous state.

25
What are potentially unwanted applications (PUAs)?
Applications classified by Windows Defender Antivirus that may not be malware but can still pose risks.
26
What are malware encyclopedias?
Comprehensive databases maintained by antivirus vendors containing information about viruses, worms, Trojans, and rootkits.
27
What is the first action to take if a system is suspected to be infected with malware?
Quarantine the infected system.
28
What does quarantining a host entail?
Preventing it from communicating on the main network to reduce the risk of malware spreading.
29
Fill in the blank: After detecting malware symptoms, you should disable _______.
System Restore.
30
What is the main tool used for malware remediation?
Antivirus software.
31
True or False: Antivirus and anti-malware are synonymous terms.
True.
32
What should you do if your antivirus software does not detect a virus?
Use a different suite of malware removal tools.
33
List the steps required for manual removal of advanced malware.
* Terminate suspicious processes using Task Manager * Execute commands in command prompt * Manually remove registry items * Boot into Safe Mode * Use recovery media to run commands from a clean environment * Scan the disk from another system
34
What is a complete system restore?
Reformatting the disk, reinstalling the OS, and restoring data files from a clean backup.
35
What should be configured to prevent malware reinfection?
* On-access scanning * Scheduled scans * Regular updates of antivirus definitions
36
Why is it necessary to re-enable System Restore after cleaning a system?
To create fresh restore points and ensure backup systems are operational again.
37
What is DNS spoofing?
A technique that allows attackers to redirect users to fake websites.
38
What role does effective user training play in malware prevention?
It reduces vulnerability to social engineering and phishing attacks.
39
What topics should be covered in security-awareness training?
* Password management * Common malware threats * Secure software use * Anti-phishing training
40
Why might a PC infected with malware display no obvious symptoms?
Some malware is sophisticated enough to evade detection.
41
Why might you need to use a virus encyclopedia?
To verify symptoms against known malware indicators.
42
Is it likely that multiple users reporting slow performance indicates a malware infection?
Yes, it could be a sign of a malware infection.
43
If a user is stuck on a web page with a pop-up message, is her computer likely infected with malware?
Not necessarily; further investigation is needed.
44
If a browser reports an invalid certificate when signing into online banking, what should be suspected?
Another cause besides the bank updating its certificate.
45
Why is DNS configuration important in the malware remediation process?
To prevent attackers from redirecting users to malicious sites.