2.3 Flashcards
How does a trojan horse work ?
Software that pretends to be something else.
Does a Trojan horse replicate ?
Typically, no.
What does a rootkit do ?
Modifies core system files
What makes rootkits particulary dangerous ?
Invisible to the OS and therefore can be invisible to standard AV suites.
What is the standard way to remove a rootkit ?
Use a removal tool specifically designed for the Rootkit in questions.
What is a virus ?
Malware that can replicate itself
What prevention method can stop unasigned software from running during the boot process ?
Secure Boot found in most modern UEFI.
How is Spyware typically installed ?
Peer to Peer or fake software ads.
What are some examples of Spyware ?
Browser monitor and Keyloggers.
Why are keyloggers particulary dangerous ?
Your keystrokes are in the clear i.e. not encrypted.
How does Ransomware work ?
Malware encrypts your data files. You must then pay for the decryption key.
How do crypto miners work ?
Hijack some of your CPU for usage in mining crypto currencies.
What is the last ditch method for recovery when resolving a malware issue ?
Windows Recovery Environment.
Why is the Windows Recovery Environment a very powerful tool for resolving Malware issues ?
Offers complete control before the system can boot.
Enable/disable services, remove from the cmd prompt or even wipe if necessary.
What is the best antiphishing tool ?
(Educating) The User.