Chapter 21 Malicious Code and Application Attacks Flashcards

1
Q

______ store the majority of
their code on another portion of the storage media.

master boot record infection file infection
macro infection
service injection

A

master boot record infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

may slightly alter the code of an executable program, thereby implanting
the technology the virus needs to replicate and damage the system.

master boot record infection file infection
macro infection
service injection

A

file infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ first appeared on the scene in the mid-1990s, utilizing crude technologies
to infect documents created in the popular Microsoft Word environment.

master boot record infection file infection
macro infection
service injection

A

macro infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ —injecting themselves into trusted runtime processes
of the operating system, such as svchost.exe, winlogin.exe, and explorer.exe

master boot record infection file infection
macro infection
service injection

A

Service Injection Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ use more than one propagation technique in an attempt to penetrate systems that defend against only one method or the other

master boot record infection file infection
macro infection
service injection

A

Multipartite viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________ hide themselves by actually tampering with the operating
system to fool antivirus packages into thinking that everything is functioning normally.

master boot record infection file infection
macro infection
service injection

A

Stealth viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ do not generate modified signatures by changing their code;
instead, they alter the way they are stored on the disk.

master boot record infection file infection
macro infection
service injection

A

Encrypted viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

malicious code objects that infect a system and lie dormant until they are triggered by the
occurrence of one or more conditions such as time, program launch, website logon, and
so on

A

Logic Bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a software program that appears benevolent but carries a malicious,
behind-the-scenes payload that has the potential to wreak havoc on a system or network.

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

propagate themselves

without requiring any human intervention.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______ monitors your actions and transmits important details to a remote system that spies on your activity

Spyware
Adware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_______ uses a variety of techniques to display advertisements on infected computers.

Spyware
Adware

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ occurs when a program checks access permissions too far in advance of a resource
request.

A

time-of-check-to-time-of-use (TOCTTOU or TOC/TOU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

undocumented command sequences that allow individuals with knowledge
of the back door to bypass normal access restrictions.

A

Back Doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unix operating systems store encrypted versions of a user’s password in the _______ file.

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ _______ _______ attacks occur when web applications contain some type of reflected input.

A

Cross-Site Scripting (XSS)