Lesson 4 - Identifying Social Engineering and Malware Flashcards

1
Q

A class of malware that modifies system files, often at the kernel level, to conceal its presence.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

A

Ramsomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A malicious program or script that is set to run under particular circumstances or in response to a defined event.

A

Logic bomb
“mine”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A malicious program or script that is set to run under particular circumstances or in response to a defined event.

A

Logic bomb
Mine Trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Trojan that searches for files to encrypt and then prompts the victim to pay a sum of money before a certain countdown time, after which the malware destroys the key that allows the decryption.

A

Cryptolocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of crypto-malware hijacks the resources of the host to perform cryptocurrency mining.

A

Crypto-mining or Cryptojacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software capable of detecting and removing virus infections and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools, and so on.

A

Antivirus (A-V) software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A software agent and monitoring system that performs multiple security tasks.

A

Endpoint Protection Platforms (EPPs) or next-gen A-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A system that can provide automated identification of suspicious activity by user accounts and computer hosts.

A

User and Entity Behavior Analytics (UEBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited.

A

Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Implementation of a sandbox for malware analysis.

A

Cuckoo
“cuckoosandbox.org”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network monitoring system that uses a baseline of acceptable outcomes or event patterns to identify events that fall outside the acceptable range.

A

Anomaly analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Indicators that a legitimate OS process has been corrupted with malicious code for the purpose of damaging or compromising the system.

A

abnormal process behavior analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly