Malware Attacks- Lesson 2 Flashcards

1
Q

is an umbrella term for “malicious software”. Describes any malicious program or code that is harmful to systems

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware is short for ____

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware seek to…? (4)

A
  1. invade
  2. Damage, or disable
  3. Steal
  4. Delete or alter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

displays unwanted software designed to throw advertisements up on your screen.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malware that secretly observes the computer user’s activities without permission and reports it to the software’s author.
Collects information about users’ activities without their knowledge or consent.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware that records all the user’s keystrokes on the keyboard.
monitors user activity.

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do keyloggers can be inserted into a system through phishing, social engineering or malicious downloads?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

software that gives malicious actors remote control of a victim’s computer with full administrative privileges.

A

Rootkit

!can also conceal other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit, also known as ____

A

“root” access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a piece of code that inserts itself into an application and executes when the app is running.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

target vulnerabilities in operating systems to install themselves into networks.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

can spread across systems on their own. Self-replicating

A

Gummy Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It usually represents itself as something useful in order to trick you.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cannot execute or reproduce unless the app it has infected is running.
Worm, Virus, or Trojan?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

require users to download them in order to activate.
Worm, Virus or Trojan?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to regain access.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

two most common ways that malware accesses your system are the ____ and ____?

A

Internet and email

18
Q

What type of malware is designed to steal sensitive information such as login credentials?

A

Trojan
or
Adware

19
Q

type of malware that is designed to spread through USB drives

A

Worm

(kala ko nga Trojan or Virus eh)

20
Q

What is the most common method of distributing malware?

A

email attachments

21
Q

what kind of malware is:

RobinHood?

A

Ransomware

22
Q

what kind of malware is:

DarkHotel?

A

Spyware

23
Q

what kind of malware is:

Emotet?

A

Trojan

24
Q

what kind of malware is:

Stuxnet

A

Worm

25
Q

what kind of malware is:

Zacinlo

A

Rootkit

26
Q

what kind of malware is:

Olympic Vision

A

Keylogger

27
Q

what kind of malware is:

Brain

A

Virus

28
Q

what kind of malware is:

Melissa

A

Virus

29
Q

what kind of malware is:

WannaCry

A

Ransomware

30
Q

what kind of malware is:

Zeus

A

Trojan

31
Q

what kind of malware is:

Pegasus

A

Spyware

32
Q

what kind of malware is:

Shlayer

A

Trojan

33
Q

what kind of malware is:

Back Office

A

Rootkit

34
Q

Answer the ff:

An Adware can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- Yes
  • Damage- No
  • Disable- No
  • Alter- No
  • Delete- No
35
Q

Answer the ff:

A Spyware can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- Yes
  • Damage- No
  • Disable- No
  • Alter- No
  • Delete- No
36
Q

Answer the ff:

A Rootkit can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- Yes
  • Damage- Yes
  • Disable- Yes
  • Alter- Yes
  • Delete- Yes
37
Q

Answer the ff:

A Keylogger can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- Yes
  • Damage- No
  • Disable- No
  • Alter- No
  • Delete- No
38
Q

Answer the ff:

A Virus can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- Yes
  • Damage- Yes
  • Disable- Yes
  • Alter- Yes
  • Delete- Yes
39
Q

Answer the ff:

A Worm can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- Yes
  • Damage- Yes
  • Disable- Yes
  • Alter- Yes
  • Delete- Yes
40
Q

Answer the ff:

A Trojan can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- Yes
  • Damage- No
  • Disable- No
  • Alter- Yes
  • Delete- Yes
41
Q

Answer the ff:

A Ransomware can:
* Invade?
* Steal?
* Damage?
* Disable?
* Alter?
* Delete?

A
  • Invade- Yes
  • Steal- No
  • Damage- No
  • Disable- Yes
  • Alter- No
  • Delete- No