Malware Flashcards

1
Q

Software that is designed to infiltrate and damage a system

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False? Viruses require user action in order to reproduce and spread

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of virus that is stored in the first sector of a hard drive and is loaded into memory upon boot

A

Boot sector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of virus embedded into a document and is executed when the document is opened by the user

A

Macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type of virus that seeks out executables or application files to infect

A

Program virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of virus that combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer

A

Multipartite virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of virus that uses a cipher to encrypt its contents to avoid detection by any antivirus software

A

Encryption virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of virus that changes its code each time it’s executed by altering the decryption module to evade detection

A

Polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of virus that has the ability to rewrite itself entirely before attempting to infect a file

A

Metamorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type of virus that has a layer of protection to confuse a program or a person who’s trying to analyze it

A

Armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A piece of malicious software that can replicate itself without any interaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A piece of malicious software that is disguised as a piece of harmless or desirable software

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of Trojan that provides the attacker with remote control of a victim computer

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware that restricts access to a victim’s computer system until a ransom is received

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware that uses a vulnerability in your software to gain access and then encrypts your files

A

Ransomware

17
Q

Malware that secretly gathers information about the user without their consent

A

Spyware

18
Q

Displays advertisements based upon its spying on you

A

Adware

19
Q

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences

A

Grayware
(“joke”ware like crazy mouse)

20
Q

Software designed to gain administrative level control over a system without detection

A

Rootkit

21
Q

Type of rootkit that has malicious code that is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime

A

DLL Injection (Dynamic Link Libraries)

22
Q

Type of rootkit attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level

A

Driver Manipulation

23
Q

A piece of software code that is placed between two components to intercept calls and redirect them

A

Shim

24
Q

A collection of compromised computers under the control of a master (command and control: C2) node

A

Botnet

25
Q

Occurs when many machines target a single victim and attack them at the exact same time

A

DDoS

26
Q

A hospital’s file server has become infected with malware. The files on the server all appear to be encrypted and cannot be opened. The network administrator receives an email from the attacker asking for 20 bitcoin in exchange for the decryption key. Which type of malware MOST likely infected these computers?

a) Spyware
b) Ransomware
c) Keylogger
d) Rootkit

A

b) Ransomware

27
Q

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

a) Worm
b) Virus
c) Trojan
d) Ransomware

A

a) Worm

28
Q

Which of the following is the BEST way to regularly prevent different security threats from occurring within your network?

a) Disaster recovery planning
b) User training and awareness
c) Penetration testing
d) Business continuity training

A

b) User training and awareness

Studies have shown that an investment in end-user cybersecurity awareness training has the best return on investment of any risk mitigation strategy