Malware Flashcards

1
Q

Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 7 types of malware classifications?

A
Viruses
Worms
Trojan Horses
Ransomware
Spyware
Rootkits
Spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 10 types of virus classifications?

A
Boot sector
Marco
Program
Multipartite
Encrypted
Polymorphic
Metamorphic
Stealth
Armored
Hoax
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses that are stored in the first sector of a hard drive and are loaded into memory upon boot up.

A

Boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A virus embedded into a document and is executed when the document is opened by the user.

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Viruses that infect an executable or application.

A

Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Viruses that combine boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer.

A

Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Viruses that use a cypher to encrypt the contents of itself to avoid detection.

A

Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection.

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A virus that is able to rewrite itself entirely before it attempts to infect a file. An advanced version of a polymorphic virus.

A

Metamorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A category of viruses that use various techniques to avoid detection. Examples are encrypted, polymorphic and metamorphic.

A

Stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Viruses that have a layer of protection to confuse a program or person analyzing it.

A

Armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A virus used to trick a user into infecting their own machine.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious software like a virus, but is able to replicate itself and spread without user consent or interaction.
They can cause disruption to normal traffic and computing activities.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malicious software that is disguised as a piece of harmless or desirable software, and performs malicious functions.

A

Trojan Horse

17
Q

Provides the attacker with remote control of the victim computer and is the most commonly used type of trojan.

A

Remote Access Trojan (RAT)

18
Q

Malware that restricts access to a victim’s computer system until a ransom is received. Uses a vulnerability in software to gain access and then encrypts files.

A

Ransomware

19
Q

Malware that secretly gathers information about the user without their consent. Can capture keystrokes made by the victim, and take screenshots that are sent to the attacker.

A

Spyware

20
Q

A type of spyware that displays advertisements based on your behavior it has observed.

A

Adware

21
Q

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences.

A

Grayware

22
Q

Software designed to gain administrative level control over a system without detection.
They are activated before booting the operating system and are difficult to detect.

A

Rootkit

23
Q

A type of rootkit who’s malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime.
Is commonly used by rootkits to maintain persistent control.

A

DLL Injection

24
Q

A type of rootkit that relies on compromising the kernel-mode device drivers that operate at a privileged or system level. Acts as a shim that is placed between two components to intercept called and redirect them.

A

Driver Manipulation

25
Q

Activity that abuses electronic messaging systems, most commonly through mail.

A

Spam

26
Q

Spammers often exploit a company’s open mail relays to send their messages.
This law was put in place to combat this, making companies that have vulnerable open mail relays liable.

A

CAN-SPAM Act of 2003