Chapter 6 Flashcards

1
Q

how is malware classified into 2 broad categories

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are 3 propogation techniques used by malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does malware do once it reaches a target

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are attack kits

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are APTs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how do APTs differ from normal malware

A

Careful target selection and stealthy intrustion efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does APT stand for

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what can a virus do once it attactches to an executable program

A

anything the program is permitted to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 components to a virus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the trigger in a virus

A

the event or condition that determines when the payload is activated or delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the payload of a virus

A

what the virus does (besides spreading)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 phases of a virus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a boot sector infector

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a file infector

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a macro virtus

17
Q

what is an encrypted virus

18
Q

what is a stealth virus

19
Q

what is a polymorphic virus

20
Q

what is a metamorphic virus

21
Q

What is a worm

22
Q

What are some ways that worms spread

23
Q

What is a hitlist when a worm is looking for a new host

24
Q

What is a driveby download

25
What is clickjacing
26
what is a logic bomb
27
What is the diff between a bot and a worm
28
what is spyware
29
What is phishing
30
what is spear phishing
31
what are 2 ways to prevent/protect against a worm
32
what is a backdoor
33
what is a stealthing rootkit
34
What is Generic Decryption
35
What 3 elements does a GD scanner compose of
36
what is host based behavior blocking software
37
What is perimiter scanning
38