Ethical Hacking 8 Flashcards

1
Q

A client has brought to you several workstations that are presenting with various symptoms and issues. Within the list are several obvious symptoms of malware infection, while other symptoms appear to be benign hardware or software issues. What workstations are most likely NOT infected by a virus?

A

Workstation D: Computer displays an error about the system clock immediately upon turn on, and the system date time is off by several months.

Workstation A: Computer beeps several times when powered on, does not display anything on the screen. Beeps continue same pattern until computer is turned off via power button.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT an indication of a virus attack?

A

The computer beeps at startup with no screen display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which virus was specifically designed to wreak havoc in a real-time physical environment?

A

Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of malware is a self-replicating program that produces its own code by attaching copies of itself to other executable codes, and operates without the knowledge or desire of the user.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is true about the first known computer virus?

A

It caused a poem to be displayed on every 50th boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After detecting a virus or worm infecting a network, what should be the next step responding personnel take on the system?

A

Utilities such as handle.exe, listdlls.exe, fport.exe, and netstat.exe should be used to gather intelligence information on how the infection is behaving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What virus construction kit can you use to encrypt a virus you’ve developed and generate a random decryptor using random registered and random instructions?

A

Rajaats Tiny Flexible Mutator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which file extension could indicate a file that is harboring a virus and is system device driver on Windows systems?

A

.SYS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An executable file that was determined to be infected with a virus was terminated from the running processes list. However, after a few seconds, you discover the infected file is running again, despite no other processes appearing to be infected. What type of virus might this be?

A

terminate and stay resident virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A client has asked for you to test their anti-virus and malware scanning software by attempting to exploit common office software. You have chosen to target the client’s use of Microsoft office programs, which is present on all workstations in the environment. What kind of virus is ideally suited for this kind of attack?

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What worm, designed for use in cyber-warfare against Iranian targets, has the capability to manipulate and control real-world equipment?

A

Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What statements accurately describe how a worm differs from a virus?

A

A worm will attempt to spread after being installed, using different vectors at its disposal.

A work typically does not typically modify programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A virus or worm that deprives users of control over their computers, creating frustration and lack of confidence in modern technology is considered to cause what type of damage?

A

Psychological Damages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What statement accurately describe a virus signature?

A

A virus signature is an identifying piece of code unique to a virus that is used by anti-virus scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When the virus code forms a layer around the target host program’s code and the original code is moved to a new location by the virus code, what form of virus is being used?

A

Shell Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of virus remains permanently in memory during the entire work session even after the target host program is executed and terminated?

A

TSR

17
Q

What statement accurately describes a virus?

A

A virus is a self replicating and contagious program that produces code by attaching copies of itself to other applications.

18
Q

Which type of virus detection products perform their functions by reading and recording integrated data to develop a signature or baseline for those files and system sectors?

A

Integrity checking

19
Q

What anti-virus software utilizes a minimal-impact, high performance virus scanning engine?

A

NOD32 Anti-Virus

20
Q

What statement accurately describes the Love Letter / I LOVE YOU virus?

A

It was malware that utilized social engineering to trick victims into opening e-mail attachments that would then spread itself via the user’s e-mail contact list.