Malware Flashcards

1
Q

Activities of malware include:

A

-Gather info (keystrokes)
-Show you advertising
-Encrypts your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps to protect against ransomware?

A

-Always have a backup
-Keep your OS & apps up to date
-Keep your anti-virus/anti-malware signatures up to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virus

A

Malware that can reproduce itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Script viruses

A

Operating system & browser-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Macro viruses

A

Common in Microsoft Office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fileless virus

A

Operates in memory, never installed in a file or app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worms

A

Malware that self-replicates
*firewall and IDS/IPS can mitigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Malware that captures your surfing habits & keystroke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection against spyware include:

A

-Maintaining your anti-malware
-Create a backup
-Run some scans; malwarebytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bloatware

A

unwanted software that comes pre-installed on device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keyloggers, how can it be prevented?

A

programs that capture keystrokes from a keyboard.
-Patching
-Systems management
-Multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logic bombs, how to we prevent it?

A

functions or code placed inside other programs that will activate when set conditions are met.
-Electronic monitoring
-Constant auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkits, how to prevent it?

A

Designed to hide, gives hackers access & control over a device.
-Patching
-Ensuring privilege management.
-Secure Boot to validate systems & files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure boot with UEFI

A

Can find and remove rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RFID cloning

A

duplicates of access badges & key fobs, why we have MFA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly