9-2 Flashcards
____________ virus hoax used an email toget a person to delete a specific file that was actually needed by the systemic will ask you to delete the ________.exe file.
JDBGMGR
JDBGMGR.exe is actually the Microsoft _____________________ for java. deleting this may cause java based web applets to not function properly
Debugger Registar
this hoax showed up in 2003 via email that tried to get the recipient to believe that filing taxes via online is not safe. this hoax did not cause much damage , it just shook the confidence of users in the online Efile system
tax return hoax
this hoax causes no direct harm but can become a huge annoyance, the equivilant of a prank phone called _________
W32 Torch Hoax
first known ransomware was the 1989 ________________ that only encrypted filenames with a weak symetric cipher
PC Cyborg Trojan
this ransomware started spreading within health care. this began in Russia and Ukraine
2017 wannacry
a virus that attacks the computer in multiple ways
multipartite
it installs itself and then ramins in RAM from the time the computer is noted up to when it is shutdown
memory resident
an ___________ uses techniques that make it hard to analyze. code confusion is one such method. The code is written such that if the virus is disassembled, the code wont be easily followed. compressing code is another method .
armored virus
3 types of stealth viruses
sparse infector
encrypted
polymorphic
this virus attempts to elude detection by performing it’s malicious activities only sporadically. with this type of virus the user will see symptoms for a short period, then no symptoms, then syptoms again. in this case the virus the infector targets a specific program but only executes every 10 to 20th time it runs.
sparse infector
sometimes a virus is __________ even with weak _____________, just enough to prevent n antivirus program from recognizing it
encrypted
changes its forms from time to time to prevent detection by antivirus software.
polymorphic
more complex , advanced viruses are developed in _________. One __________ may do very little except get itself installed o the target.
modules
2 ways for a virus scanner to work. one is off a ______ list. the second is to watch for typical___________ of a virus
known virus
behavior