Malware Flashcards
Given a scenario, analyze indicators of malicious activity
What is the primary goal of fileless malware?
A. Infect the file system to execute malicious code
B. Infect the system’s memory to execute malicious code
C. Target antivirus solutions with direct attacks
D. Leave a large amount of evidence on the system
Answer:
B. Infect the system’s memory to execute malicious code
Explanation:
Correct: Fileless malware operates in memory, avoiding reliance on the local file system to execute its payload.
Incorrect:
A: Fileless malware avoids the file system.
C: The goal is not to directly target antivirus but to bypass it.
D: Fileless malware leaves minimal evidence.
(Choose Two)
Which of the following describe characteristics of fileless malware?
A. Relies heavily on the local file system
B. Executes directly in system memory
C. Often leaves behind limited evidence
D. Activates only with physical user interaction
Answer:
B. Executes directly in system memory
C. Often leaves behind limited evidence
Explanation:
Correct:
B: Fileless malware avoids the local file system and operates directly in memory.
C: It erases most traces after execution, leaving little evidence.
Incorrect:
A: Fileless malware does not rely on the local file system.
D: It can execute remotely without user interaction.
What are the two primary components of the modern malware deployment model?
A. Downloader and Keylogger
B. Dropper and Downloader
C. Worm and Ransomware
D. Macro and Shell Code
Answer:
B. Dropper and Downloader
Explanation:
Correct: Modern malware uses a dropper to initiate infection and a downloader to retrieve additional malicious payloads.
Incorrect:
A, C, D: These combinations are unrelated to the deployment model.
(Choose Three)
Which of the following are common malware delivery techniques?
A. Code Injection
B. Masquerading
C. DLL Sideloading
D. File Compression
Answer:
A. Code Injection
B. Masquerading
C. DLL Sideloading
Explanation:
Correct:
A, B, C: These are legitimate malware delivery techniques to inject malicious code or disguise it as legitimate.
Incorrect:
D: File compression is more of an anti-forensic strategy, not a delivery method.
What does the acronym “DLL” stand for in malware exploitation techniques?
A. Data Link Layer
B. Dynamic Link Library
C. Direct Link Loader
D. Digital Library Link
Answer:
B. Dynamic Link Library
Explanation:
Correct: DLL refers to a library of code that can be injected or sideloaded during an attack.
Incorrect: The other options do not apply to this context
What is the term for exploiting legitimate system tools, such as PowerShell, to conduct malicious activities?
A. Code Injection
B. Living off the Land
C. Shell Coding
D. Anti-Forensics
Answer:
B. Living off the Land
Explanation:
Correct: This strategy uses legitimate tools like PowerShell to mask malicious activities.
Incorrect:
A: Code injection disguises malicious code but is not the same as using system tools.
C: Shell coding is for executing exploits, not specifically leveraging legitimate tools.
D: Anti-forensics focuses on hiding malicious evidence, not tool exploitation.
What are the four main stages of a modern malware attack?
A. Infiltration, Execution, Defense, Concealment
B. Installation, Execution, Expansion, Concealment
C. Dropper, Downloader, Action on Objectives, Concealment
D. Infiltration, Expansion, Exfiltration, Concealment
Answer:
C. Dropper, Downloader, Action on Objectives, Concealment
Explanation:
Correct: The attack involves initial infection (dropper), retrieval of tools (downloader), achieving goals (action on objectives), and hiding evidence (concealment).
Incorrect: Other options mix or misrepresent the stages of a malware attack
Which malware component retrieves additional tools after the initial infection?
A. Dropper
B. Downloader
C. Shell Code
D. Ransomware
Answer:
B. Downloader
Explanation:
Correct: Downloaders are designed to retrieve and install additional malware components.
Incorrect:
A: Droppers initiate the infection.
C: Shell code refers to lightweight code for exploits, not retrieval.
D: Ransomware is a type of malware, not a retrieval mechanism.
What is the primary characteristic of a computer virus?
A. It always requires user permission to execute.
B. It replicates and spreads across a network once executed.
C. It cannot infect executable files.
D. It only affects internet-connected devices.
Answer:
B. It replicates and spreads across a network once executed.
Explanation:
Correct: A virus spreads across a network by replicating itself after user action, such as running a malicious program.
Incorrect Options:
A: Viruses often execute without the user’s explicit knowledge or permission.
C: Viruses commonly infect executable files.
D: Viruses can infect devices regardless of internet connectivity.
(Choose Two)
Which two types of files are most commonly targeted by macro viruses?
A. Microsoft Word documents
B. Video files
C. Microsoft Excel spreadsheets
D. Operating system log files
Answer:
A. Microsoft Word documents
C. Microsoft Excel spreadsheets
Explanation:
Correct: Macro viruses often target Word and Excel files, embedding malicious code in documents.
Incorrect Options:
B: Video files are not common targets for macro viruses.
D: Log files are not typically associated with macro viruses.
Which virus type combines boot sector and program virus characteristics?
A. Polymorphic virus
B. Multipartite virus
C. Macro virus
D. Stealth virus
Answer:
B. Multipartite virus
Explanation:
Correct: A multipartite virus infects the boot sector and programs, ensuring persistence even after partial removal.
Incorrect Options:
A: Polymorphic viruses primarily focus on evading detection by altering their code.
C: Macro viruses target office documents.
D: Stealth viruses use techniques to avoid detection.
List the 10 types of computer viruses.
Answer:
Boot Sector
Macro
Program
Multipartite
Encrypted
Polymorphic
Metamorphic
Stealth
Armor
Hoax
Explanation:
These categories encompass various methods and techniques viruses use to infect systems and evade detection.
What is the key characteristic of an encrypted virus?
A. It alters its code to evade detection.
B. It uses encryption to hide its malicious payload.
C. It embeds in documents like Word or Excel.
D. It resides in the boot sector of the hard disk.
Answer:
B. It uses encryption to hide its malicious payload.
Explanation:
Correct: Encrypted viruses scramble their malicious payloads to evade detection by anti-virus software.
Incorrect Options:
A: Altering code to evade detection describes a polymorphic virus.
C: Embedding in documents is characteristic of a macro virus.
D: Residing in the boot sector applies to boot sector viruses.
(Choose Three)
Which of the following techniques are commonly used by stealth viruses to evade detection?
A. Encrypting contents
B. Modifying the payload
C. Hiding in boot sector
D. Changing decryption modules
Answer:
A. Encrypting contents
B. Modifying the payload
C. Hiding in boot sector
Explanation:
Correct: Stealth viruses use techniques like encryption and payload modification to avoid anti-virus detection.
Incorrect Option:
D: Changing decryption modules is specific to polymorphic viruses.
What is the primary objective of a hoax virus?
A. To spread across networks and infect multiple devices.
B. To scare users into taking undesirable actions.
C. To install itself in the boot sector of a hard disk.
D. To corrupt critical system files.
Answer:
B. To scare users into taking undesirable actions.
Explanation:
Correct: Hoaxes rely on social engineering to trick users into actions that may compromise their systems.
Incorrect Options:
A: Hoaxes don’t replicate like viruses.
C: Boot sector infections are characteristic of boot sector viruses.
D: Hoaxes typically do not involve direct file corruption.
What is the primary difference between a virus and a worm?
A. A virus can replicate without user interaction, while a worm requires user action.
B. A worm can replicate without user interaction, while a virus requires user action.
C. A virus and a worm both require user action to spread.
D. Neither viruses nor worms require user interaction to spread.
Correct Answer:
B. A worm can replicate without user interaction, while a virus requires user action.
Explanation: A virus requires user action, such as opening a file or clicking a link, to spread, whereas a worm spreads autonomously by exploiting vulnerabilities.
(Choose Two)
Which of the following are reasons worms are considered dangerous?
A. They can disrupt network traffic by replicating excessively.
B. They require user action to spread.
C. They can exploit vulnerabilities in unpatched systems.
D. They are only a threat to standalone systems without network access.
Correct Answers:
A. They can disrupt network traffic by replicating excessively.
C. They can exploit vulnerabilities in unpatched systems.
Explanation: Worms are dangerous because they can overwhelm networks and computing resources by replicating and spreading autonomously through vulnerabilities.
What specific vulnerability did the Conficker worm exploit in 2009?
A. A flaw in web browsers.
B. An issue in file and printer sharing on Windows systems.
C. A vulnerability in email clients.
D. Weak passwords on user accounts.
Correct Answer:
B. An issue in file and printer sharing on Windows systems.
Explanation: Conficker exploited a vulnerability in Windows’ file and printer sharing, which was addressed by the Microsoft patch 08-067.
(Choose Two)
What indicators might suggest that a worm is present on a network?
A. Slow network performance due to resource exhaustion.
B. Files being encrypted and held for ransom.
C. Increased CPU and memory usage on multiple systems.
D. Unauthorized remote connections made to external command servers.
Correct Answers:
A. Slow network performance due to resource exhaustion.
C. Increased CPU and memory usage on multiple systems.
Explanation: Worms consume significant network and compute resources as they replicate, leading to performance degradation.
Which worm was able to spread across the internet in just 22 minutes in 2001?
A. Conficker
B. Nimda
C. WannaCry
D. Stuxnet
Correct Answer:
B. Nimda
Explanation: Nimda, which is “admin” spelled backward, spread quickly across the internet, even in the era of slow dial-up connections.
What action should organizations take to mitigate the spread of worms?
A. Disable all network connections.
B. Perform regular security patching and implement security controls.
C. Only install antivirus software.
D. Avoid using file-sharing applications.
Correct Answer:
B. Perform regular security patching and implement security controls.
Explanation: Regular patching and proper security controls prevent worms from exploiting known vulnerabilities.
What is a potential outcome if a worm replicates too rapidly on a network?
A. It could encrypt all files on the system.
B. It could cause a denial-of-service (DoS) attack.
C. It could open backdoors for unauthorized access.
D. It could redirect traffic to malicious websites.
Correct Answer:
B. It could cause a denial-of-service (DoS) attack.
Explanation: Excessive replication of worms can overwhelm network and server resources, effectively causing a denial-of-service condition.
What is the primary characteristic of a Trojan in cybersecurity?
A. It self-replicates without user interaction.
B. It is disguised as a harmless or desirable piece of software.
C. It primarily infects through USB devices.
D. It can only function when connected to the internet.
Correct Answer: B
Explanation: A Trojan is malicious software disguised as a harmless or desirable program to trick the user into running it. Once executed, it performs both the promised function and malicious actions.
Incorrect Options:
A: This describes a worm, not a Trojan.
C: While Trojans can spread via USB devices, this is not their defining characteristic.
D: Trojans can perform malicious actions offline or online; they are not limited to internet connectivity.
Which type of Trojan provides attackers with remote control of a victim’s machine?
A. RAT (Remote Access Trojan)
B. Bootkit
C. Ransomware
D. Worm
Correct Answer: A
Explanation: A RAT (Remote Access Trojan) is a specific type of Trojan that allows attackers to gain remote control over the victim’s machine.
Incorrect Options:
B: A Bootkit targets the boot process of a system and is not related to remote access.
C: Ransomware encrypts files and demands payment but does not typically provide remote access.
D: Worms self-replicate but are not related to remote control functionality.
What historical event inspired the name “Trojan” in cybersecurity?
A. The siege of Troy, where a wooden horse was used to infiltrate the city.
B. A virus outbreak in ancient Greece.
C. The use of malicious scripts in the early internet era.
D. A vulnerability in early Microsoft operating systems.
Correct Answer: A
Explanation: The term “Trojan” originates from the story of the Trojan horse used by the Greeks to infiltrate Troy, symbolizing how Trojans disguise themselves as harmless objects to gain access.
Incorrect Options:
B: The name does not come from a virus outbreak.
C: While Trojans appeared early in internet history, the name has historical roots.
D: While Microsoft OS vulnerabilities have been exploited, they are unrelated to the origin of the term “Trojan.”
What is the best method to prevent Trojans from infecting your system?
(Choose Two)
A. Use strong passwords for all accounts.
B. Scan all downloaded programs with antivirus software.
C. Ensure systems are patched against known vulnerabilities.
D. Disable all USB ports on your computer.
Correct Answers: B, C
Explanation:
B: Scanning downloaded programs with antivirus software helps detect Trojans before execution.
C: Patching systems against known vulnerabilities reduces the risk of exploitation by Trojans.
Incorrect Options:
A: While strong passwords are essential for security, they do not prevent Trojan infections.
D: Disabling USB ports could prevent certain attacks but is not a comprehensive solution for Trojans.
What malicious actions can Trojans perform once executed?
(Choose Three)
A. Create backdoors for persistent access.
B. Spread independently across a network.
C. Conduct data exfiltration to steal sensitive documents.
D. Perform denial-of-service (DoS) attacks.
E. Open a remote connection for attackers.
Correct Answers: A, C, E
Explanation:
A: Trojans often create backdoors to allow attackers to regain access.
C: Data exfiltration is a common malicious activity performed by Trojans.
E: Remote connections are a hallmark of Remote Access Trojans (RATs).
Incorrect Options:
B: This is a characteristic of worms, not Trojans.
D: While Trojans can contribute to DoS attacks indirectly, it is not their primary function.
What made the infected Tetris game example a Trojan?
A. It failed to run as expected.
B. It was spread via the internet.
C. It contained malicious code that performed additional functions, like creating a remote connection.
D. It required user action to download and run.
Correct Answer: C
Explanation: The infected Tetris game contained malicious code that created a remote connection, which is a hallmark of a Trojan.
Incorrect Options:
A: The Trojan still ran as expected, making it deceptive.
B: This example involved floppy disks, not the internet.
D: While true for Trojans, this is not the defining characteristic illustrated in the example.