Malware And Indicators Of Compromise Flashcards

1
Q

What is malware?

A

Software that has been designed for some nefarious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Polymorphic Malware?

A

Malware that can change it’s code after each use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is A Virus?

A

A piece of malicious code that replicates by attaching itself to another piece of executable code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Armored Virus?

A

A piece of malware specifically designed to resist reverse engineering attempts

Ex: Zeus Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Crypto-malware?

A

Malware that users cryptography to encrypt files for ransome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Ransomware?

A

Malware that performs some action and extracts ransome from a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is A Worm?

A

An independent piece of malicious code or software that self-replicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is A Trojan?

A

A form of malicious code that appears to provide one service (and may indeed provide that service) but that also hides another purpose. This hidden purpose often has a malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Rootkit?

A

Malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality

5 types-
Firmware, virtual, kernel, library, and application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Keylogger?

A

Software that logs all of the keystrokes that a user enters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Adware?

A

Advertising-supported software that automatically plays, displays, or downloads advertisements after the software is installed or while the application is being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Spyware?

A

Software that spies on users, recording and reporting on their activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is A Bot?

A

Software that performs some task, under the control of another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Remote-Access Trojan (RAT)?

A

A set of malware designed to exploit a system providing remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Logic Bomb?

A

A form of malicious code or software that is triggered by a specific event or condition. Sites dormant for a period of time until some event or date invokes its malicious payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a backdoor?

A

A hidden method used to gain access to a computer system, network, or application. Often used by software developers to ensure unrestricted access to the systems they create