Malware Flashcards

1
Q

What is malware?

A

Any software that is designed to infiltrate a system and cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two things malware needs?

A

An attack/threat vector and an attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

a type of malware that attaches to another program and can replicate and spread to other computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a virus need to be dangerous?

A

Human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a boot sector virus?

A

A type of virus stored in the boot sector of a hard drive first, and then loaded into memory whenever the infected system boots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a program virus?

A

A type of virus that tries to find executables or application files to infect with their malicious codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an encrypted virus?

A

A type of virus that is designed to hide itself from being detected by AVS via encrypting it’s malicious code or payloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a metamorphic virus?

A

A type of virus that’s able to rewrite itself entirely before it attempts to infect a given file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Armor virus?

A

A type of virus with extra layers of protection that are meant to confuse analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a macro virus?

A

A virus written in the macro language. A programming language used to automate repeated tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a multipartite virus?

A

A combination of boot-sector and program virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a polymorphic virus?

A

An Advanced form of encrypted virus that scrambles its code each time it’s executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Stealth Virus?

A

A type of technique used to prevent a virus from being picked up by AVS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hoax?

A

A form of technical social engineering that attempts to scare users into taking undesirable actions on their systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Worm?

A

Malicious software that can self replicate without user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Trojan

A

Malicious software that is disguised as a piece of harmless or desirable software.

17
Q

What is ransomware?

A

Malicious software that is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker

18
Q

What are some ways to mitigate ransomware attacks?

A
  • Conducting regular backups
  • Installing regular software updates
  • Providing security awareness training
  • Implementing multi-factor authentication for a system
19
Q

What is a botnet?

A

A network of compromised computers or devices controlled remotely by malicious actors

20
Q

What is a zombie?

A

A compromised computer or device that is a part of a botnet

21
Q

What is a Command and Control Node(C2 Node)?

A

Responsible for the managing and coordination of activities to other devices with a network.

22
Q

What are common uses for botnets?

A

Implementing phising campaigns, DDoS attacks, crypto mining.

23
Q

What is a rootkit?

A

A type of software designed to gain admin level control over a given system undetected

24
Q

What are the 3 rings of protection?

A

In the context of security, the rings create a form of separation for how data and devices can be accessed.

Ring 0(Kernel Mode): Allows a system to control access to hardware
Ring 1(Root/Admin): Level where root/admin operates
Ring 2(Outermost): Level where user permissions live.

25
Q

What is DLL Injection?

A

Technique used to run code within the address space of another process by forcing it to load a DLL.

26
Q

What is a DLL?

A

Dynamic-Link Library
A shared library in windows based systems. This library file can contain code, data, and/or resources

27
Q

What is a shim?

A

Software that is placed between two components capable of intercepting communications.