CH02 Malware Flashcards

1
Q

Virus Definition

A

Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed.

Viruses require a user action in order to reproduce and spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Boot Sector Virus?

A

viruses are stored in the first sector of a hard drive and are loaded into memory upon boot up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Macro Virus?

A

Virus embedded into a document and is executed when the document is opened by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is program virus?

A

Program viruses infect an executable or application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Multipartite virus?

A

Virus that combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Encrypted Virus?

A

Uses cipher to encrypt the contents of itself to avoid detection by any antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Polymorphic virus?

A

Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Metamorphic virus?

A

Virus that is able to rewrite itself entirely before it attempts to infect a file (advanced version of polymorphic virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Stealth virus ?

A

refers to a category of virus that protects itself. (Example: Encrypted, polymorphic, and metamorphic viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Armored virus?

A

Armored viruses have a layer of protection to confuse a program or person analyzing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Hoax ?

A

Tries to trick the user into infecting their own machine. May come in the form of a message or a website that pops up. It disguises itself and prompts users to call tech support telling them that their machine has been infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is worm?

A

Malicious software, like a virus, but is able to replicate itself without user interaction.
Worms can cause disruption to normal network traffic and computing activities
Example : 2009: 9-15 million computers infected with conficker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Trojans?

A

Malicious software that is disguised as a piece of harmless or desirable software
Trojans perform desired functions and malicious functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Remote Access Trojan (RAT)?

A

Provides the attacker with remote control of a victim computer and is the most commonly used type of Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Ransomware ?

A

malware that restricts access to a victim’s computer system until a random is received.
Ransomware uses a vulnerability in your software to gain access and then encrypts your files
Example : $17 million: SamSam cost the City of Atlanta

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Spyware ?

A

Malware that secretly gathers information about the user without their consent

Captures keystrokes made by the victim and takes screenshots that are sent to the attacker

17
Q

What is Adware ?

A

Type of spyware that displays advertisements based upon its spying on you

18
Q

What is Grayware ?

A

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences

19
Q

What is Rootkit ?

A

Software designed to gain administrative level control over a system without detection

DLL injection is commonly used by rootkits to maintain their persistent control

Rootkits are activated before booting the operating system and are difficult to detect

20
Q

What is DLL Injection ?

A

Malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime

21
Q

What is Driver Manipulation ?

A

An attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level

A shim is placed between two components to intercept calls and redirect them

22
Q

What is Spam ?

A

Activity that abuses electronic messaging systems, most commonly through email