Chapter 2- Malware Flashcards

1
Q

Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of malware?

A
  • Viruses
  • Worms
  • Trojan horses
  • Ransomware
  • Spyware
  • Rootkits
  • Spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are different types of viruses?

A
  • Boot Sector
  • Macro
  • Program
  • Multipartite
  • Encrypted
  • Polymorphic
  • Metapmorphic
  • Stealth
  • Armored
  • Hoax
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Boot sector viruses are stored in the first sector of a hard drive and are loaded into memory upon boot up.

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus embedded into a document and is executed when the document is opened by the user

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

infect an executable or application.

A

Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus that combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer.

A

Multipartite Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection.

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus that is able to rewrite itself entirely before it attempts to infect a file (advanced version of polymorphic virus).

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Armored viruses have a layer of protection to confuse a program or person analyzing it.

A

Armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a computer virus/malware that is capable of encrypting its payload to make its detection hard.

A

Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a computer virus that uses various mechanisms to avoid detection by antivirus software.

A

Stealth Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipients to forward it to everyone they know, but it can also be in the form of a pop-up window.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious software, like a virus, but is able to replicate itself without user interaction and can cause disruption to normal network traffic and computing activities.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two types of trojan viruses?

A
  • Trojan Horse
  • Remote Access Trojan (RAT)
17
Q

Malicious software that is disguised as a piece of harmless or desirable software.

A

Trojan Horse

18
Q

Provides the attacker with remote control of a victim computer and is the most commonly used type of Trojan.

A

Remote Access Trojan (RAT)

19
Q

Malware that restricts access to a victim’s computer system until a ransom is received.

A

Ransomware

20
Q

What are the different types of spyware?

A
  • Spyware
  • Adware
  • Grayware
21
Q

Malware that secretly gathers information about the user without their consent.

A

Spyware

22
Q

Displays advertisements based upon its spying on you.

A

Adware

23
Q

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences.

A

Grayware

24
Q

What are the different types of rootkits?

A
  • Rootkit
  • DLL Injection
  • Driver Manipulation
25
Q

Software designed to gain administrative level control over a system without detection.

A

Rootkit

26
Q

Malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime.

A

DLL Injection

27
Q

An attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level.

A

Driver Manipulation

28
Q

Activity that abuses electronic messaging systems, most commonly through email.

A

Spam