Chapter 3- Malware Infections Flashcards

1
Q

What are the different tpyes of Malware Infections?

A
  • Threat Vector
  • Attack Vector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Method used by an attacker to access a victim’s machine.

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Method used by an attacker to gain access to a victim’s machine in order to infect it with malware.

A

Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware is placed on a website that you know your potential victims will access.

A

Watering Holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A collection of compromised computers under the control of a master node.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them.

A

Active Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’t able to access.

A

PRivilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are used to bypass normal security and authentication functions.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious code that has been inserted inside a program and will execute only when certain conditions have been met.

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature.

A

Easter Egg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some symptoms of infection?

A
  • Hard drives, files, or applications are not accessible anymore
  • Strange noises occur
  • Unusual error messages
  • Display looks strange
  • Jumbled printouts
  • Double file extensions are being displayed, such as textfile.txt.exe
  • New files and folders have been created or files and folders are missing/corrupted
  • System Restore will not function
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some ways to remove malware?

A
  • Identify symptoms of a malware infection
  • Quarantine the infected systems
  • Disable System Restore (if using a Windows machine)
  • Remediate the infected system
  • Schedule automatic updates and scans
  • Enable System Restore and create a new restore point
  • Provide end user security awareness training
  • If a boot sector virus is suspected, reboot the computer from an external device and scan it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly