Malware Flashcards

1
Q

Malware

A

Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malicious code that runs on a machine without the users knowledge and infects the computer when executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Boot Sector Virus

A

Stored in the first sector of a hard drive and loaded into memory upon boot up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Macro Virus

A

Virus embedded into a document and is executed when the document is opened by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Program virus

A

Infects an executable application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multipartite Virus

A

Virus that combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Polymorphic Virus

A

Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Metamorphic Virus

A

Virus that is able to rewrite itself entirely before it attempts to infect a file (advanced polymorphic virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Armored virus

A

Armored viruses have a layer of protection to confuse a program or person analyzing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hoax Virus

A

A virus that tries to trick a user into infect their own machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

Malicious software, like a virus, but is able to replicate itself without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojans

A

Malicious software disguised as a piece of harmless or desirable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remote access trojan (RAT)

A

Provides the attacker with remote control of a victim computer and is the most commonly used type of trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Malware that restricts access to a victim’s computer system until a ransom is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

Malware that secretly gathers information about the user without their consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Grayware

A

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences

17
Q

Rootkit

A

Software designed to gain administrative level control over a system without detection

18
Q

DLL Injection

A

Malicious code is inserted into a running process on a windows machine by taking advantage of dynamic link libraries that are loaded at runtime

19
Q

Driver Manipulation

A

An attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level

20
Q

Shim

A

Placed between two components to intercept calls and redirect them

21
Q

Spam

A

Activity that abuses electronic messaging systems, most commonly through email

22
Q

Spam Over Instant Messaging (SPIM)

A

Spam but utilizes instant messaging applications

23
Q
A