Attack types Flashcards
Which type of malware can reproduce itself, and requires user interaction to execute the program.
Virus.
Which type of malware reproduces itself, but requires no user interaction and can jump from machine to machine, and uses the network as its transmission medium?
Worm.
Which type of virus is part of the application?
Program virus.
Which type of virus is stored inside of a storage device and when you start your computer, the virus itself is launched?
Boot sector virus.
Where are script viruses usually based?
In the operating system or a browser.
Which type of virus is common to have made its way into Microsoft office?
Macro virus
Which type of virus never installs itself or saves itself as a file on your system, and instead operates solely in the memory of the computer, and also typically will add an auto start in the registry to establish persistence?
Fileless virus.
Which attack is an unfortunate use of public key cryptography, and encrypts every file on a drive until a sum of money is paid?
Ransomware
Which type of malware is designed to appear as a normal program in order to circumvent antivirus and user detection?
Trojan horse.
What is a pup?
Potentially unwanted program.
Not necessarily malicious just annoying.
Could be an annoying browser toolbar that is very hard to uninstall or a backup utility that displays ads.
Which type of malware is a way of circumventing normal authentication methods and establishing persistence?
Backdoor
Which type of malware is similar to a backdoor, but gives much deeper administrative control over a computer remotely?
RAT
remote access trojan
Which type of malware modifies core system files and integrates itself in the kernal of the computer?
Rootkit
Which type of malware forces you to have many many pop ups of advertisements?
Adware
Which type of malware is most interested in your personal information and recording what you do on the computer?
Spyware.
Keyloggers commonly will be a tool used in spyware.