Mal. Ware Flashcards

1
Q

What type of anti-malware spots mal. code within a file using Dictionary Detection??

A

Signature Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This detection looks at a whole data base dedicated to mal. code to check whether or not the file’s code matches up and is malicious.

A

Dictionary Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of anti-malware checks the code of a file for any registry changes, bios changes, or any general malicious activity??

A

Heuristic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What anti-malware constantly checks the activity and behaviour of a file??

A

Behavioural Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What anti-malware blocks users from reaching specific websites??

A

Internet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This technique allows for code to be performed within a safe area of a network to check for any mal. code.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This anti-malware checks for odd behaviour in an application.

A

Anomaly Based Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Harmless code is flagged as mal. code and blocked by an anti-malware software.

A

False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mal. code is allowed into a system after being deemed safe by an anti-malware.

A

False Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it called when a file is stripped of rights and is relocated to a file not easily accessible by regular file management utilities??

A

Quarantine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This technique can be used by hackers to get past most anti-malware software, like Firewalls for an example.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“Upon finding a virus, you need to _____ the code and/ or the programme.”

A

Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“A Mal. code that gathers information secretly”

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

“A Mal. code that displays unwanted pop-ups”

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

“Encrypts hard-drive making you need to pay”

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“Makes changes to a system then replicates itself”

A

Virus

17
Q

“Replicates itself on a Network causing unwanted traffic”

A

Worm

18
Q

“Used to get unauthorised admin access”

A

Rootkit

19
Q

“Mal. code hiding in a safe looking software”

A

Trojan

20
Q

“Records actions taken by a user”

A

Key Logger