Malware Flashcards

1
Q

malware

A

software that is designed to infiltrate and damage a system without the users consent or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

virus

A

malicious code that runs on a machine without the users knowledge and infects the computer when it is executed, requires user action to reproduce and spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

boot sector virus

A

viruses that are stored in first section of a hard drive and ae loaded into memory upon boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

macrovirus

A

virus embedded into a document and is executed when document is opened by the user, by default are not malicious and do alot of good functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

program virus

A

seek out executables or application files to infect, every time you open that program youd be loading the virus again and again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

multipartite virus

A

combines boot and program viruses to first attach itself to boot sector and system files before attacking other files on computer, allows it to have persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

encryption virus

A

virus is going to use cipher to encrypt the contents of itself to avoid detection by antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

polymorphic

A

advanced version of encrypted virus that changes its code each time it is executed by altering the decryption module for it to evade detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

metamorphic

A

can rewrite themselves entirely before it attempts to infect a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

stealth virus

A

category of virus protecting itself, metamorphic, polymorphic, and encrypted viruses fall under this category

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

armored virus

A

has a layer of protection to confuse person or program trying to analyze it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hoax

A

tries to trick user to infect their own machine,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

worms

A

malicious software but can replicate itself without user interaction, can spread and replicate fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

trojans

A

malicious software that are disguised as a piece of desirable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

remote access trojans (RAT)

A

provide attacker with remote control of a victims computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ransomware

A

malware that restricts access to a victims computer until a ransom is received

17
Q

spyware

A

malware that secretly gathers information about the user without their consent, normally installed from a website or a third party software, looks through your info and builds a profile

18
Q

keylogger

A

captures keystrokes you make

19
Q

adware

A

displays advertisements based upon its spying on you

20
Q

grayware

A

isnt benign or malicious, tends to behave improperly without serious consequences, like crazy mouse

21
Q

rootkits

A

designed to gain admin level control over a system without detection, root access, really hard to detect, installed down into ring 0 (kernel mode) and this allows them to hide from other functions of the operating system and avoid detection

22
Q

DLL injection

A

malicious code inserted into a running process on a windows machine by taking advantage of a Dynamic Link Library that are loaded at run time

23
Q

driver manipulation

A

relies on compromising kernel mode device drives that operate at a privilege or system level

24
Q

shim

A

piece of software that is placed between two components to intercept calls and redirect them

25
Q

botnet and zombies

A

collection of compromised computers under the control of a master node, controls many computers, used to conduct DDOS

26
Q

most effective means for malware removal?

A

OS reinstallation