3 Malware Infections Flashcards

1
Q

What is the term for when malware is placed on a website that you known your potential victims will access

A

watering holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the processes of removing malware

A

identify symptoms, quarantine, disable system restore, remediate the infected system, use automatic updates and scans, enable system restore and create a new restore point, priced end user security awareness training, and reboot the computer from an external device and scan it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the type of malware that is designed to install or run other types of malware embedded in a payload on an infected host

A

Dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a piece of code that connects to the internet to retrieve additional tools after the initial infection by a dropper

A

downloader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is any lightweight code designed to run an exploit on a target. This may include code format from scripting languages to binary

A

Shellcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an exploit technique that runs malicious code with the identification number of a legitimate process

A

Code injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is masquerading

A

A type of threat action whereby an unauthorized entity gains access to a system or performs a malicious act by illegitimately posing as an authorized entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DLL sideloading

A

takes advantage of weak library references and the default Windows search order by placing a malicious DLL file masquerading as a legitimate DLL on a system, which will be automatically loaded by a legitimate program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is process hollowing

A

a security exploit in which an attacker removes code in an executable file and replaces it with malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an exploit technique that uses standard system tools and packages to perform intrusions

A

Living off the land

How well did you know this?
1
Not at all
2
3
4
5
Perfectly