Antivirus Concepts Flashcards

1
Q

Fuzzing

A

is an automated software testing technique that involves providing invalid un expected or random data as input to a computer program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer Overflow

A

is an anomaly where a program while writing data to a buffer, overruns the buffers boundary and overwrite adjacent memory locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

is a situation in which a person or grogram successfully masquerades as another by falsifying data to gain an illegitimate advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

malware

A

is software that is designed to cause damage to a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

freeware

A

is software most offend proprietary that is distributed at no monetary cost to the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware

A

is a type of malware that threatens to publish the victims data or perpetually block access to it unless a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

rootkit

A

is computer software designed to enable access to a computer or area of its software that is not otherwise allowed often times masks its existence in other software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

virus

A

is a type o software that executed replicates itself by modifying other computer programs and inserting its own code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

spearfishing

A

is an email or electronic communication scam target towards individual, organization or business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mtm

A

Man in the middle

is an Attacke where the attacker secretly relays and possible alters the communications between two parties who believes they ar directly communication with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

trojan horse

A

malware that misleads use to its true intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

spyware

A

is software that aims to gather information about person or organization sometime without there knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

addware

A

is software that generate money revenue for its developers by automatically generating only advertisement in there use interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

scareware

A

is a form of malware which uses social engineering to cause shock, anxiety or the perception of threat in order to manipulate user into buying unwanted software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

backdoor

A

is a method of secret to bypassing normal authentication or encryption in computer system or product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worm

A

is a standalone malware program that replicates itself in order to spread to other computers.

17
Q

What are the 4 types of Antivirus Detection

A

Sandbox
Data Mining
Heuristic based
Signature based

18
Q

sandbox

A

program is ran in a virtual environment and logs action the program perform instead of detecting at run time.

19
Q

data mining

A

are used to attempt to classify the behavior of file as either malicious or not.

20
Q

heuristic based

A

statically examines files for suspicious characters without and exact signature match to detect new malware

21
Q

signature based

A

used to compare two file hashes

22
Q

honey pot

A

is a computer security mechanism set to detect deflect or in some manner counteract attempt at unauthorized use of information systems.