Malware Flashcards

1
Q

What is malware?

A

Malicious software designed to infiltrate computer systems and potentially damage them without user consent

Malware can take various forms and is categorized into types such as viruses, worms, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three categories of malware.

A
  • Viruses
  • Worms
  • Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat vector?

A

Method used to infiltrate a victim’s machine

Examples include unpatched software and phishing campaigns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an attack vector?

A

Means by which the attacker gains access and infects the system

It combines both the infiltration method and the infection process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of viruses?

A

Attach to clean files, spread, and corrupt host files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe worms.

A

Standalone programs replicating and spreading to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What defines a Trojan?

A

Disguises as legitimate software, granting unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ransomware?

A

Encrypts user data, demands ransom for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are zombies and botnets?

A

Compromised computers remotely controlled in a network for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define rootkits.

A

Hide presence and activities on a computer, operate at the OS level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are backdoors?

A

Allow unauthorized access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a logic bomb?

A

Malicious code that executes when certain conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a keylogger?

A

Records keystrokes, captures passwords or sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does spyware function?

A

Monitors and gathers user/system information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is bloatware?

A

Software that comes pre-installed on devices that users did not specifically request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: A _______ is a piece of malicious software that can replicate itself without user interaction.

17
Q

True or False: Ransomware guarantees data recovery if the ransom is paid.

18
Q

What is a botnet?

A

Network of compromised computers or devices controlled remotely by malicious actors

19
Q

What is a command and control node?

A

Computer responsible for managing and coordinating activities of other nodes within a network

20
Q

What is the purpose of a rootkit?

A

Gain administrative level control over a computer system without being detected

21
Q

What is DLL injection?

A

Technique used to run arbitrary code within the address space of another process

22
Q

What is a stage one dropper?

A

Piece of malware created as a lightweight shellcode that can be executed on a system

23
Q

What does ‘living off the land’ mean in cybersecurity?

A

Exploiting standard tools to perform intrusions

24
Q

What are common indicators of malware attacks? Name two.

A
  • Account lockouts
  • Concurrent session utilization
25
Q

What is a common indicator of malware attacks related to user accounts?

A

Account Lockouts

Malware designed for credential theft or brute force attacks can trigger multiple failed login attempts resulting in account lockouts.

26
Q

What does Concurrent Session Utilization indicate in malware detection?

A

Multiple simultaneous or concurrent sessions from various geographic locations for a single user account

This may suggest unauthorized access to the account.

27
Q

What does an increase in Blocked Content alerts signify?

A

A sudden increase in blocked content alerts from security tools

This may indicate potential malware activity or attempts to access restricted content.

28
Q

Define Impossible Travel in the context of malware attacks.

A

Accessing a user’s account from geographically separated locations in an impossibly short period of time

This scenario suggests that the account may have been compromised.

29
Q

What is Resource Consumption in relation to malware indicators?

A

Unusual spikes in CPU, memory, or network bandwidth utilization not linked to legitimate tasks

Such spikes may indicate malware activity consuming system resources.

30
Q

What is Ransomware?

A

A form of malware that encrypts user files to make them inaccessible

Ransomware may demand payment to decrypt the affected data.

31
Q

What does Resource Inaccessibility indicate?

A

A large number of files or critical systems suddenly becoming inaccessible

Users may receive messages demanding payment to regain access.

32
Q

What does Out-of-Cycle Logging suggest in malware detection?

A

Logs generated at odd hours or during times with no legitimate activities

This may indicate unauthorized access or activities occurring outside normal operating hours.

33
Q

What does Missing Logs indicate during a log review?

A

Gaps in logs or cleared logs without authorized reason

This may suggest tampering or an attempt to hide malicious activities.

34
Q

What does Published or Documented Attacks refer to?

A

Reports showing that an organization’s network has been infected as part of a botnet or malware-based attack

This information can be critical for assessing the security posture of an organization.