2.4.4, 2.4.5, 2.4.6 Flashcards

1
Q

What are viruses and worms?

A

Types of malware categorized by their ability to self-replicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What distinguishes viruses from worms?

A

Viruses require user interaction to spread, while worms can spread independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a characteristic of worms in terms of self-replication?

A

They do not need to rely on programs to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can viruses and worms affect a target?

A

By infecting specific programs on a computer.
By encrypting sensitive data on a local network.
By spreading to the boot sector of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a recommended defense against viruses?

A

Restricting the level of privilege users and processes natively run in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a common defense measure against both viruses and worms?

A

Regularly updating antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is adware?

A

Software that installs extra components to deliver additional advertising, often in the form of pop-up ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does adware affect computer performance?

A

It slows down computer performance by increasing network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a common method of distributing adware?

A

Bundling it with free software downloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is spyware different from adware?

A

Spyware monitors computer and internet usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of data does spyware typically monitor?

A

Website visit history and browsing habits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is bloatware?

A

Software that comes pre-installed on devices by manufacturers and consumes system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do manufacturers pre-install bloatware on devices?

A

To generate additional revenue through partnerships with software developers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a keylogger?

A

A software program that tracks and logs keystrokes on a victim’s keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are keystrokes valuable to attackers?

A

They contain data such as passwords, usernames, and credit card information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do keyloggers capture data other than individual keystrokes?

A

By taking screenshots, logging items copied to the clipboard, and capturing instant messages.

17
Q

Why are keyloggers not affected by encryption protection?

A

Because they intercept keyboard inputs before encryption takes place.

18
Q

What are some legitimate uses for keyloggers?

A

Monitoring a child’s online activity.

19
Q

How did the FBI use a keylogger in an investigation against cybercriminals?

A

By capturing the suspects’ usernames and passwords.

20
Q

How do keyloggers spread?

A

Through email attachments, instant messages, text messages, or visiting malicious websites.

21
Q

What is a recommended defense against keyloggers when opening email attachments?

A

Use caution when opening attachments and consider using one-time passwords and multi-factor authentication.

22
Q

How can password managers help protect against keyloggers?

A

By not requiring typing the saved password each time for access.

23
Q

How can alternate keyboard layouts help defend against keyloggers?

A

By preventing keylogger software from capturing keystrokes.

24
Q

What is a logic bomb?

A

A piece of code that waits for specific conditions to be met before executing.

25
Q

What are triggers in the context of logic bombs?

A

Specific events or conditions that cause the logic bomb to execute.

26
Q

What are time bombs?

A

Logic bombs that detonate after a certain amount of time has passed.

27
Q

Who is likely to install a logic bomb as an insider threat?

A

A disgruntled employee with privileged access to computer systems.

28
Q

Why are logic bombs hard to identify?

A

They are stealthy by nature and remain inactive until triggered.

29
Q

What is a recommended defense against logic bombs?

A

Regularly updating the operating system and patching vulnerabilities.

30
Q

What is a rootkit?

A

A type of malware that provides administrative access to a computer while concealing its presence.

31
Q

What is the main role of a rootkit?

A

To alter system files and conceal its presence to avoid detection.

32
Q

Why are rootkits difficult to detect?

A

Because they alter system files and data reports to avoid detection.

33
Q

How do rootkits block some antivirus software?

A

By activating before the operating system boots up.

34
Q

What type of rootkit overwrites the firmware of the system’s BIOS?

A

Firmware rootkit.

35
Q

What is the purpose of Secure Boot in defending against rootkits?

A

To detect tampering with boot loaders and key operating system files.

36
Q

Which operating system was targeted by the Machiavelli rootkit?

A

Mac OS X

37
Q

What is Stuxnet?

A

The first-known rootkit for industrial control systems (ICS).