Malware Flashcards

1
Q

What is black hat search engine optimization?

A

Black hat SEO (also referred to as unethical SEO) uses aggressive SEO tactics such as keyword stuffing, inserting doorway pages, page swapping, and adding unrelated keywords to get higher search engine rankings for malware pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malvertising?

A

This technique involves embedding malware-laden advertisements in legitimate online advertising channels to spread malware on systems of unsuspecting users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is rich text format injection?

A

RTF injection involves exploiting features of Microsoft Office such as RTF template files that are stored locally or in a remote machine. RTF templates are used for specifying the document format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a malware “crypter”?

A

It is a software program that can conceal the existence of malware. Attackers use this software to elude antivirus detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a malware downloader?

A

It is a type of Trojan that downloads other malware (or) malicious code and files from the Internet to a PC or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a malware dropper?

A

It is a covert carrier of malware. Attackers embed notorious malware files inside droppers, which can perform the installation task covertly. Attackers need to first install the malware program or code on the system to execute the dropper. The dropper can transport malware code and execute malware on a target system without being detected by antivirus scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a malware exploit?

A

It is the part the malware that contains code or a sequence of commands that can take advantage of a bug or vulnerability in a digital system or device. Attackers use such code to breach the system’s security through software vulnerabilities to spy on information or to install malware. Based on the type of vulnerabilities abused, exploits are categorized into local exploits and remote exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a malware injector?

A

This program injects exploits or malicious code available in the malware into other vulnerable running processes and changes the method of execution to hide or prevent its removal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a malware obfuscator?

A

It is a program that conceals the malicious code of malware via various techniques, thus making it difficult for security mechanisms to detect or remove it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a malware packer?

A

This software compresses the malware file to convert the code and data of the malware into an unreadable format. It uses compression techniques to pack the malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a malware payload?

A

It is the part of the malware that performs the desired activity when activated. It may be used for deleting or modifying files, degrading the system performance, opening ports, changing settings, etc., to compromise system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a malware malicious code?

A

This is a piece of code that defines the basic functionality of the malware and comprises commands that result in security breaches.
It can take the following forms:
o Java Applets
o ActiveX Controls
o Browser Plug-ins
o Pushed Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly