3. Malicious code Flashcards

1
Q

What are the different types of malware?

A

Malware includes:
* Ransomware
* Trojans
* Worms
* Spyware
* Bloatware
* Viruses
* Keyloggers
* Logic bombs
* Rootkits

Each type has distinctive elements that security analysts need to understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do security analysts need to know about malware?

A

Security analysts need to know:
* What identifies each type of malware
* How to identify it
* Common controls deployed against it
* What to do if encountered

Knowledge of these aspects is crucial for effective malware management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are common indicators of compromise (IoCs) associated with malware?

A

Common IoCs include:
* Command and control (C&C) traffic patterns
* IP addresses
* Hostnames
* Domains
* Unexpected use of system utilities
* Lateral movement between systems
* Creation of files and directories
* Encryption of files
* Data exfiltration

These indicators vary based on the type of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Signatures for malware are used to identify specific files associated with given malware packages.

A

True

However, malware writers use defensive techniques to make identification harder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What methods can be used to mitigate malware?

A

Methods include:
* Manual removal
* Use of tools to identify and remove malicious files
* Reinstallation of a system
* Restoration from a known good backup

These methods ensure all malware is removed and systems are secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: Indicators of compromise associated with malware vary based on the type of malware and how it is _______.

A

[designed and used]

Understanding the design and usage is key to identifying IoCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly