Chapter 21: Malicious Code and Application Attacks Flashcards

1
Q

___ viruses use more than one propagation technique in an attempt to penetrate systems that defend against only one method or the other.

A

Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ viruses hide themselves by actually tampering with the operating system to fool antivirus packages into thinking that everything is functioning normally.

A

Stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ viruses actually modify their own code as they travel from system to system.

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ viruses use cryptographic techniques to avoid detection

A

Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ are malicious code objects that infect a system and lie dormant until they are triggered by the occurrence of one or more conditions such as time, program launch, website logon, certain keystrokes, and so on.

A

Logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a software program that appears benevolent but carries a malicious, behind-the-scenes payload that has the potential to wreak havoc on a system or network

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

they propagate themselves without requiring any human intervention.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ monitors your actions and transmits important details to a remote system that spies on your activity.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It uses a variety of techniques to display advertisements on infected computers.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a type of malware that weaponizes cryptography. After infecting a system through many of the same techniques used by other types of malware, it then generates an encryption key known only to the author and uses that key to encrypt critical files on the system’s hard drive and any mounted drives. This encryption renders the data inaccessible to the authorized user or anyone else other than the malware author.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ vulnerabilities exist when a developer does not properly validate user input to ensure that it is of an appropriate size.

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a ____ SQL injection attack, the perpetrator sends input to the web application that tests whether the application is interpreting injected code before attempting to carry out an attack.

A

content-based blind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly