Malware Attacks Flashcards

1
Q

Ransomware

A

Form of malware designed to encrypt the files on device rendering them to unusable. Files are with unique extension assigned to malware. After encryption on the screen you can se instruction how to pay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bloat ware

A

Unwanted and potentially harmful software preloaded onto new devices. Also known as potentially unwanted applications (PUA - type of code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logic bomb

A

Code with execute when certain event or different time occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Memory resident

A

Malware stays resident in memory upon execution and can infect other programs running on the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkit

A

Computer program designed to provide continued, privileged access to a computer while actively hiding its presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stealth

A

Malware technique, malware is designed to be inconspicuous in order to avoid detection by concealing file size or moving to alternate location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Malicious software, used for steal info, harm/disrupt operations, weaponize devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

Malicious code whose primarily function is to replicate and deliver its payload (what is designed for)- requires a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Polymorphic malware evades pattern

A

Matching detection by frequent changing identifiable characteristics like file name, file type or encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT advanced persistent threat

A

Sophisticated, slow stealthy and prolonged attack with the intention to compromise system and gain information from or about the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

C2 - command and control attack

A

Object is for the compromised system to contact “command center” which gives the attacker control of the infected device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PUA potentially unwanted applications

A

Type of unwanted code, also known as bloatware. This software is unwanted and potentially harmful software preloaded onto new devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Is a software with malicious behavior that aims to gather information about the person, organization and send it to another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bot/zombie

A

Automated processes that either have instructions or listen for instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Backdors

A

Code designed to bypass access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bloatware actions

A

This action will fore us to make purchase, hard to uninstall, is useless, bombards users with pop-ups

17
Q

Metamorphic malware

A

Is written with each other iteration so that each succeeding version of the code is different from the proceeding code

18
Q

worm

A

Malicious code that exploit known vulnerabilities, it is self replicating and often takes advantage of network transport creatures to spread

19
Q

Trojan

A

Malicious code that looks legitimate and acts like bona fide file or application while simultaneously delivering or performing malicious action (downloaded, keylogger)

20
Q

Firmware rootkit

A

overwrite the firmawre (BIOS) so the rootkit can start before the operating system

21
Q

Boot kit

A

Root kit, which replace the operating systems boot-loader (software), PC loads boot kit before operating system

22
Q

Kernel rootkit

A

Replaces portion of operating system kernel, so that the rootkit can start automatically when the operating system loads

23
Q

Driver rootkit

A

Impersonates a trusted driver that the operating system uses to communicate with the hardware