MOD 6 QUIZ- Malicious Code Flashcards

1
Q

What is APT?

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Code Signing?

A

Using digital signatures to ensure authenticity of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are security flaws discovered by hackers that have not been thoroughly addressed by the security community?

A

Zero-Days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one of the primary uses of a Botnet?

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack uses a specially formatted input to execute user-defined SQL Commands?

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spyware?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which well-known worm infected Iranian nuclear enrichment facilities in mid-2010?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are all the pertinent Secure Coding Practices?

A

Eliminate Hard-Coded Credentials
Maintain Error Handling
Secure Code Comments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are all the Pertinent Application Attacks

A

Buffer Overflow
Rootkit
Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Logic Bomb?

A

Malicious code that lies dormant until triggered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main functions of a virus?

A

Propagation
Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Malware?

A

A broad range of software threats that exploit security vulnerabilities to spread malicious payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Virus Propagation Technique injects itself into trustworthy processes?

A

Service Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What viruses use encryption to hide malicious activity?

A

Encrypted Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Integrity Monitoring?

A

Programs that detect unauthorized file modifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly