L10 - Modern Malware Flashcards

1
Q

The bot “Spamming” is:

a) Used by botmasters to fraudulently increase revenue from advertisers
b) Used to gather valuable financial information
c) Infected machines send out unsolicited emails

A

c) Infected machines send out unsolicited emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The bot “Click Fraud” is:

a) Used by botmasters to fraudulently increase revenue from advertisers
b) Used to gather valuable financial information
c) Infected machines send out unsolicited emails

A

a) Used by botmasters to fraudulently increase revenue from advertisers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The bot “Phishing” is:

a) Used by botmasters to fraudulently increase revenue from advertisers
b) Used to gather valuable financial information
c) Infected machines send out unsolicited emails

A

b) Used to gather valuable financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The attacker does not have to use his own computer in the attack

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Since there are so many computers involved in the attack, it is difficult to distinguish legitimate from malicious traffic

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The characteristics of DNS servers help mitigate the effect of DDoS attacks

a) True
b) False

A

b) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bots have more sophisticated communication capabilities than worms and viruses

a) True
b) False

A

a) True

It has the ability to perform C&C (command and control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bots require direct communication with the C&C server before beginning an attack

a) True
b) False

A

b) False

No need to communicate if attack is set on a timer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A botnet will be less likely to be found if it uses custom communication protocols

a) True
b) False

A

b) False

If it is custom, it will stand out from normal traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Gmail account is used for C&C, email address hardcoded in botcode.

Does it satisfy the following C&C schemes:

  • Efficient/reliable communications
  • Stealth communications (hard to detect)
  • Resilient communications (hard to disrupt)

a) True
b) False

A

b) False

An account receiving emails for C&C all over the internet. This is not hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

P2P protocol is used for C&C, query string is hardcoded in botcode

Does it satisfy the following C&C schemes:

  • Efficient/reliable communications
  • Stealth communications (hard to detect)
  • Resilient communications (hard to disrupt)

a) True
b) False

A

b) False

Not hard to detect, P2P traffic in enterprise network will stand out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A “news” web site has been set up for C&C, i.e. commands can be “parsed” from news articles. Website and parsing logic hardcoded in botcode.

Does it satisfy the following C&C schemes:

  • Efficient/reliable communications
  • Stealth communications (hard to detect)
  • Resilient communications (hard to disrupt)

a) True
b) False

A

b) False

This is hard to detect. Reading news appears a lot like normal traffic but the website can be easily blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The “Boy in the Browser” APT activity does the following:

a) Eavesdrops
b) Modifies web pages
c) Covertly records keystrokes
d) Covertly changes a computer’s network routing
e) Web users unknowingly click on something that is not as it is portrayed

A

d) Covertly changes a computer’s network routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The “Clickjacking” APT activity does the following:

a) Eavesdrops
b) Modifies web pages
c) Covertly records keystrokes
d) Covertly changes a computer’s network routing
e) Web users unknowingly click on something that is not as it is portrayed

A

e) Web users unknowingly click on something that is not as it is portrayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The “Man in the Browser” APT activity does the following:

a) Eavesdrops
b) Modifies web pages
c) Covertly records keystrokes
d) Covertly changes a computer’s network routing
e) Web users unknowingly click on something that is not as it is portrayed

A

b) Modifies web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The “Man in the Middle” APT activity does the following:

a) Eavesdrops
b) Modifies web pages
c) Covertly records keystrokes
d) Covertly changes a computer’s network routing
e) Web users unknowingly click on something that is not as it is portrayed

A

a) Eavesdrops

17
Q

The “Keyloggers” APT activity does the following:

a) Eavesdrops
b) Modifies web pages
c) Covertly records keystrokes
d) Covertly changes a computer’s network routing
e) Web users unknowingly click on something that is not as it is portrayed

A

c) Covertly records keystrokes

18
Q

What approach can be used to detect the example APT malware (the malicious browser extension)?

A network monitor that analyses traffic to detect anomalies or known bad traffic (e.g. to known bad domains)

a) True
b) False

A

a) True

19
Q

What approach can be used to detect the example APT malware (the malicious browser extension)?

A host monitor that examines operating systems activities (e.g. access to files)

a) True
b) False

A

a) True

20
Q

What approach can be used to detect the example APT malware (the malicious browser extension)?

A malware analysis system that identifies malicious logic (e.g. running the browser in a sandbox and tracing its execution)

a) True
b) False

A

a) True