2.3 Flashcards

1
Q

How does a trojan horse work ?

A

Software that pretends to be something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Does a Trojan horse replicate ?

A

Typically, no.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a rootkit do ?

A

Modifies core system files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes rootkits particulary dangerous ?

A

Invisible to the OS and therefore can be invisible to standard AV suites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the standard way to remove a rootkit ?

A

Use a removal tool specifically designed for the Rootkit in questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a virus ?

A

Malware that can replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What prevention method can stop unasigned software from running during the boot process ?

A

Secure Boot found in most modern UEFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is Spyware typically installed ?

A

Peer to Peer or fake software ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some examples of Spyware ?

A

Browser monitor and Keyloggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are keyloggers particulary dangerous ?

A

Your keystrokes are in the clear i.e. not encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Ransomware work ?

A

Malware encrypts your data files. You must then pay for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do crypto miners work ?

A

Hijack some of your CPU for usage in mining crypto currencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the last ditch method for recovery when resolving a malware issue ?

A

Windows Recovery Environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is the Windows Recovery Environment a very powerful tool for resolving Malware issues ?

A

Offers complete control before the system can boot.
Enable/disable services, remove from the cmd prompt or even wipe if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best antiphishing tool ?

A

(Educating) The User.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give an example of testing end users against phishing attempts ?

A

Send a phishing email. Find out who clicks and gives up information.

17
Q

When reinstalling the OS, what’s the quickest way to install the new system ?

A

Recover from a prebuilt image.

18
Q

What option provides the most effective means for malware removal?

A

OS reinstallation.

19
Q

What type of virus infects the storage drive area containing the necessary data and code used to start the OS ?

A

Boot sector virus.

20
Q

What is the likely cause of system slow down, files disappearing, or loss disk space ?

A

A virus

21
Q

What is WinRE ?

A

Windows recovery enviroment.

22
Q

What does the Reset This PC option in Windows recovery enviroment do ?

A

OS reinstall, keeps files.

23
Q

What type of malware is designed to provide unauthorized access to a system by creating a backdoor?

A

Trojan

24
Q

What type of malware is designed to modify a system’s operating system to hide its presence and evade detection?

A

Rootkit

25
Q

What type of malware is designed to cause physical damage to a system, such as destroying hardware or erasing data?

A

Virus

26
Q

What type of malware is designed to activate at a specific time or date to perform a malicious action?

A

Logic bomb

27
Q

Does a virus require human interaction to spread ?

A

Yes.

28
Q

What is a common first tool technique you can utilize to detect rootkits ?

A

Secure boot
There are other validation techniques but Secure boot is the easiest to access.

29
Q

What does spyware do ?

A

Obtains information about an individual, organization, or system and then sends it to a malicious actor.

30
Q

In short what is Windows RE ?

A

A simplified, scaled-back version of the Windows operating system.

31
Q

How do you access WinRE ?

A

You’d load up WinPE and select the WinRE option.