Chapter 03: Malicious Code Flashcards

1
Q

______ describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users. It can also gather info provide illicit access, and take a broad range of actions that the legitimate owner of a system or network may not want to occur.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is malware that takes over a computer and then demands a ransom.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense against ransomware.

A

Effective backup system that stores files in a separate location that will not be impact if the system or device it backs up is infected and encrypted by ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

crypto malware is an example of ______.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ are a type of malware that is typically disguised as legitimate software.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ provide attackers with remote access to systems.

A

Remote Access Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defense against Trojans

A

Security Awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Every Trojan is a Remote Access Trojan.

A

False. A Remote Access Trojan is a subject of a Trojan. But, not every Trojan is a remote access Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ are self-install and spread themselves.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stuxnet is an example of a ___.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______ are malware that is specifically designed to allow attackers to access a system through a backdoor.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the ways to detect a rootkit on a computer?

A
  • Testing the suspected system from a trusted system or device.
  • Rootkit detection tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a common recommendation for removing rootkits?

A

Restore from a good last known backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ are methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Detection for backdoors.

A
  • Unexpected ports
  • Unexpected services

Note: More advanced backdoors may be leveraging existing services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ are remotely controlled systems or devices that have a malware infection.

A

Bots

17
Q

Groups of bots are known as ______.

A

Botnets

18
Q

_____ are used by attackers who control them to perform various actions, ranging from additional compromises and infection, to Denial-of-service attacks or acting as spam relays.

A

Botnets

19
Q

Many botnet _______ systems operate in a client-server mode. For example, they will contact the _____ systems, which provide commands and updates, and track how many systems are in the botnet.

A

COC (Command and Control)

20
Q

____ was frequently used to manage client-server botnets in the past, but many modern botnets rely on HTTPS traffic to hide C&C traffic and to prevent it from easily being monitored and analyzed by defenders.

A

Internet Relay Chat (IRC)

21
Q

_____ are programs that capture keystrokes from keyboards.

A

Keyloggers

22
Q

Name a defence against Keylogger

A

Use multifactor Authentication (MFA)

23
Q

______ are not independent malicious programs. Instead, they are functions or code that are placed inside other programs that will activate when set conditions are met.

A

Logic bombs

24
Q

_____ are malicious programs that self-copy and self-replicate. These typically have a trigger and a payload.

A

Computer Viruses

25
Q

Payload

A

What the virus does, delivers, or the actions it performs.

26
Q

Trigger

A

Sets conditions for the virus to execute.

27
Q

______ remains in memory while the system of device is running.

A

Memory-resident viruses

28
Q

_____ which will execute, spread and then shut down.

A

Non-memory resident Virus

29
Q

____ which use macros or code inside word processing software or other tools to spread.

A

Macro Viruses

30
Q

____ which spread via email either as attachments or as part of the email itself using flaws within email clients.

A

Email Viruses

31
Q

_____ attacks are similar to traditional viruses in a number of critical ways. They spread via methods like spam email and malicious websites, and they exploit flaws in browser plug-ins and web browsers themselves.

A

Fileless Viruses

32
Q

_____ is malware that is designed to obtain information about an individual, organization, or system.

A

Spyware

33
Q

____ is a type of spyware used to illicitly monitor partners in a relationships.

A

stalkerware

34
Q

Spyware Defense

A
  • Antimalware tools
  • User awareness
35
Q

______ are programs not wanted by the user but are not as dangerous as other types of malware. These are typicall installed without the user’s awareness or as part of a software bundle.

A

Potentially Unwanted Programs (PUP)

36
Q

____ include adware, browser toolbars, web browser-tracking programs, and others.

A

PUPs

37
Q

______ is where AI is used by attackers for malicious purposes.

A

Adversarial Artificial Intelligence