Malware overview Flashcards

1
Q

Ransomware

A

Malware that restricts access to a victim’s computer system until a ransom is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of Malware that uses a vulnerability in your software to gain access and then encrypt your files

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sypyware

A

Malware that secretly gathers information about the user without their consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keylogger

A

Type of spyware that captures Keystrokes made by the victim and takes screenshots that are sent to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adware

A

Type of spyware that displays advertisements based on the information the spyware has gathered on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Grayware

A

Malware that isn’t benign nor malicious and tends to behave improperly without serious consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rootkit

A

Software designed to gain admin level control over a system without detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DLL INJECTION

A

A method commonly used in root kits that is inserted into a running windows machine by taking advantages of Dynamic Link Libraries (DLL) that are loaded during run times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Driver Manipulation

A

A method commonly used in root kits that relies on compromising the kernel-mode device drivers that operate at a privileged or system level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

shim

A

root kit that is placed between two components to intercept calls and redirect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At what point in the start up are root kits activated

A

before the operating system boots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the best way to detect a root kit

A

Boot from an external device and than scan the internal hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spam

A

activity that abuses electronic messaging systems, most commonly through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus

A

Code that infects a computer when a file is opened or executed

requires a user action like opening a file, clicking an exe, or downloading a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worm

A

a virus that can self replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan

A

Malware that appears to do a desired function but also has malicious code embedded within for a secondary purpose