Chapter 6 Flashcards

1
Q

advertising that is integrated into software. it can result in pop-up ads or redirection of a browser to a commercial site

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

set of tools for generating new malware automatically using a variety of supplied propagation and payload mechanisms

A

attack kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious hacker tools used to break into new machines remotely

A

auto-rooter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

any mechanism that bypasses a normal security check; it may allow unauthorized access to functionality in a program, or onto a compromised system.

A

backdoor (trapdoor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Code that installs other items on a machine that is under attack. it is normally included in the malware code first inserted on to a compromised system to then import a larger malware package.

A

downloaders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack using code in a compromised web site that exploits a browser vulnerability to attack a client system when the site is viewed.

A

drive-by-download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

code specific to a single vulnerability or set of vulnerabilities.

A

exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Used to generate a large columns of data to attack networked computer systems, by carrying out some form of denial-of-service DoS attacks

A

Flooders (DoS client)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

captures keystrokes on a compromised system

A

keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Code inserted into malware by an intruder. a _____ lies dormant until a predefined condition is met; the code then triggers an unauthorized act

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a type of virus the uses macro or scripting code, typically embedded in a document, and triggered when the document is viewed or edited, to run and replicate itself into other such documents

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics

A

mobile code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Set of hacker tools used after attacker has broken into a computer system and gained root-level access

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used to send large volumes of unwanted e-mail

A

Spammer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software that collects information from a computer and transmits it to another system by monitoring keystrokes, screen data, and or network traffic; or by scanning files on the system for sensitive information.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the ______ program

A

Trojan horse

17
Q

Malware that, when executed, tries to replicate itself into other executable machine or script code; when it succeeds, the code is said to be infected. when the infected code is executed, the _____ also executes.

A

Virus

18
Q

A computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network, usually by exploiting software vulnerabilities in the target system.

A

worm

19
Q

Program activated on an infected machine that is activated to launch attacks on other machines.

A

Zombie/bot

20
Q

___ ____ uses multiple methods of infection or propagation, to maximize the speed of contagion and the severity of the attack

A

blended attack

21
Q

These toolkits, ____, now include a variety of propagation mechanisms and payload modules that even novices can combine, select, and deploy.

A

Crimeware

22
Q

A typical virus goes through which four phases

A

1) Dormant Phase
2) Propagation Phase
3) Triggering Phase
4) Execution Phase

23
Q

The means by which a virus spreads or propagates, enabling it to replicate. the mechanism is also referred to as the infection vector

A

infection mechanism

24
Q

the event or condition that determines when the payload is activated or delivered, sometimes known as a logic bomb

A

trigger.

25
Q

What the virus does, besides spreading. the ____ may involve damage or may involve benign but noticeable activity.

A

Payload

26
Q

Creates copies during replication that are functionally equivalent but have distinctly different bit patterns, in order to defeat programs that scan for viruses. in this case, the “signature” of the virus will vary with each copy.

A

Polymorphic virus

27
Q

A search to find other systems to infect

A

scanning or fingerprinting

28
Q

When some malware encrypts the user’s data, and demands payment in order to access the key needed to recover this information.

A

ransomware.

29
Q

an attacks on a computer system or network that acauses loss of service to users.

A

DDoS (Distributed denial-of-service attack)

30
Q

With the help of a botnet and thousands of bots, an attacker is able to send massive amounts of bulk e-mail

A

spamming

31
Q

bots can also use a packet sniffer to watch for interesting clear-text data passing by a compromised machine. the sniffers are mostly used to retrieve sensitive information like usernames and passwords.

A

sniffing traffic