Malware Flashcards

1
Q

what is a virus?

A

malicious code that runs on a machine without the users knowledge and infects the computer when executed. Viruses require user action in order to reproduce and spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a boot sector virus?

A

virus that is stored in the first sector of a hardrive and is loaded into memory on boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a Macro virus?

A

virus embedded into a document and is executed when the document is opened by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a program virus?

A

seeks out executables or application files to infect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is multipartie virus?

A

combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is encryption with a virus?

A

uses a cipher to encrypt its contents to avoid detection by any antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a polymorphic virus?

A

changes its code each time its executed by altering the decryption module to evade detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a metamorphic virus?

A

has the ability to rewrite itself entirely before attempting to infect a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is an armored virus?

A

has a layer of protection to confuse a program or a person whos trying to analyze it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a worm?

A

malicious software that can replicate itself without any user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a trojan?

A

a piece of malicious software that is disguised as a piece of harmless software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a remote access trojan?

A

provides the attacker with remote control of a victim computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a rootkit?

A

software designed to gain administrative level control over a system without detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is DLL injection?

A

commonly used by rootkits to maintain their persistent control. malicious code is inserted into a running process on a windows machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is driver manipulation?

A

an attack that relies on compromising the kernal-mode device drivers that operate at a privileged or system level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

whats a Shim?

A

a piece of software code that is placed between two components to intercept calls and redirect them.

17
Q

what is a botnet?

A

a collection of compromised computers under the control of a master node.

18
Q

what are some symptoms of malware?

A

recurrent BSOD, hardrives files and applications are not accesible anymore, strange noises, unusual error messages, display looks strange, jumbled print outs

19
Q

what is another way that malware tries to hide in your system?

A

by using double file extensions.

20
Q

what is another symptom of malware infection?

A

that your anti virus/malware system wont run

21
Q

what is the first thing you should do if you suspect malware is on your computer?

A

run a scan

22
Q

what is the first step of removing malware?

A

identify the symptoms of a malware infection.

23
Q

what is the second step of removing malware?

A

quarantine the infected systems

24
Q

what is the third step of removing malware?

A

disable system restore.

25
Q

what is the fourth step of removing malware?

A

remediate the infected system

26
Q

what is the fifth step of removing malware?

A

schedule automatic updates and scans.

27
Q

what is the 6th step in removing malware?

A

enable system restore and create a new restore point.

28
Q

what is the 7th step in removing malware?

A

provide end user security awareness training

29
Q

what do you do if a boot sector virus is suspected?

A

reboot the computer from an external device and scan it.

30
Q

what is another hard drive related way that you can remove malware?

A

remove the hardrive from the infected machine, connect to a clean workstation as a secondary drive and then scan it.

31
Q

what is best detected using anti malware solutions?

A

worms, trojans and ransomware