M1 Malware Flashcards

1
Q

What is Malware?

A

Malware (Malicious Software) refers to any harmful program or file intentionally designed to damage or gain unauthorized access to a computer, network, or server.

Example types include keyloggers, trojans, ransomware, and rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common types of Malware?

A
  1. Keyloggers
  2. Trojans
  3. Ransomware
  4. Rootkits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Keylogger?

A

Records keystrokes to capture sensitive data, such as passwords or bank information.

Forms include software keyloggers and hardware keyloggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan?

A

Malware disguised as a legitimate program to entice users to install it, giving attackers access to the system.

Common types include SMS Trojan, Backdoor Trojan, Ransom Trojan, Downloader Trojan, and Fake AV Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Ransomware?

A

Encrypts files and demands a ransom for decryption.

Infection methods include email phishing, website pop-ups, and drive-by downloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Rootkit?

A

Malware that provides hidden, persistent access to a system for attackers.

Types include Firmware Rootkits, Bootloader Rootkits, Memory Rootkits, Application Rootkits, and Kernel Mode Rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Virus?

A

Malware that replicates by infecting files or programs.

Examples include Creeper, Elk Cloner, and ILOVEYOU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Worm?

A

A type of malware that can self-replicate without needing a host program and spreads automatically, often causing network disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Phishing?

A

Fraudulent emails attempting to steal sensitive data or spread malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Man-in-the-Middle (MitM) Attack?

A

Eavesdropping attacks where attackers intercept data between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Denial-of-Service (DoS) Attack?

A

Overwhelms a system with traffic to prevent legitimate access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SQL Injection?

A

Injects malicious code into SQL databases to access unauthorized data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Zero-Day Exploit?

A

Attacks a system vulnerability before it is patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common Cybersecurity Measures?

A

Antivirus Software

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of Hackers?

A

Black Hat, White Hat, Gray Hat, Blue Hat, Red Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stateful Firewalls

A

Tracks active connections to ensure legitimate traffic.

Example: Stateful firewalls keep track of the state of network connections to allow only authorized traffic.

17
Q

Application Firewalls

A

Monitors HTTP traffic and blocks web-based threats.

Application firewalls focus on monitoring and controlling traffic at the application layer to protect against web-based threats.

18
Q

Black Hat

A

Illegally access systems for personal gain, often causing harm.

Black Hat hackers are motivated by personal gain and typically engage in illegal activities to compromise systems.

19
Q

White Hat

A

Ethical hackers who secure systems by identifying vulnerabilities.

White Hat hackers work to improve security by identifying weaknesses in systems and helping to fix them.

20
Q

Gray Hat

A

Hackers who explore systems without harmful intent but without authorization.

Gray Hat hackers may test systems without permission, but their actions are not malicious in nature.

21
Q

Blue Hat

A

Motivated by revenge, targeting specific individuals or organizations.

Blue Hat hackers seek revenge by targeting specific individuals or organizations through cyber attacks.

22
Q

Red Hat

A

Vigilantes targeting Black Hat hackers to prevent future attacks.

Red Hat hackers take a proactive approach by targeting Black Hat hackers to prevent future malicious activities.

23
Q

Green Hat

A

New hackers seeking to learn and develop hacking skills.

Green Hat hackers are beginners who are eager to learn and improve their hacking abilities.

24
Q

Script Kiddies

A

Inexperienced individuals using pre-made software to disrupt systems (e.g., DoS attacks).

Script Kiddies rely on ready-made tools to launch attacks without understanding the underlying technology.