Module 6: Handling Malicious Code Incidents Flashcards

1
Q

What is a virus

A

Small malicious codes that are attached to files in computers and replicate themselves to spread and infect other files without the user’s knowledge or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do viruses spread

A

Through email attachments, instant messages, download from the Internet, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Viruses are generally characterized as

A
  • File infectors (attached to programs or files)
  • System or boot-record infectors (infect executable code)
  • Macro viruses (Infect Word application)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm

A

A self-replicating computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a worm spread

A

Worms spread automatically by infecting one system after the other in a network, and even spreading further to other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TRUE or FALSE: A worm relies for a user’s action for execution

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Trojan

A

Malicious programs masked as a genuine harmless program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a Trojan work

A

Install backdoors on user’s system and allows unauthorized access to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spyware

A

Software that gathers user information without user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does one generally start the preparation for preventing malware

A

Installing anti-virus software and backing up important data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 10 steps to handling malware incidents

A
  1. Establish malicious code security policy
  2. Install antivirus software
  3. Check all downloaded files and email attachments for infection
  4. Check all the removable media such as USB, diskettes, etc.
  5. Users must be aware of malicious code issues
  6. Study the antivirus vendor bulletins
  7. Install host based IDS’s on critical hosts
  8. Collect malware incident analysis resources
  9. Acquire malware incident mitigation software
  10. Establish the procedures for reporting of malicious code incident
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TRUE or FALSE: A point of contact for reporting malicious code is needed

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can spyware be prevented

A

Disabling a user’s web browser such that it prevents the installation of plug-ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is one way to help make sure users handle email attachments properly

A

Educate the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

.exe, .txt, .vbs, .htm are all examples of files that need to be what

A

Blocked due to malicious file extensions. Especially on the email server and client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How might a user know if they have a virus

A
  • Files are deleting, are corrupted, or inaccessible
  • Computer runs slowly or crashes
  • Sudden increase in emails and crashes
  • Odd messages and graphics
17
Q

How might a user know if they have a worm

A
  • Increase network bandwidth
  • Failed connections
  • Programs running slowly or do not start
  • System crashes
18
Q

How might a user know if they have a Trojan

A
  • IDS, firewall, and router alert on suspicious client-server connections
  • Unknown processes being executed
  • High amount of network traffic
  • Programs running slowly or do not start
  • System crashes
19
Q

What are the steps in a malware containment strategy

A
  • Disconnect infected hosts from the network & the network from the Internet
  • Register malicious code with antivirus (submit sophos sample)
  • Block emails & particular hosts
  • Shut down email servers
  • Soliciting user participation
  • Disable services
  • Disable connectivity
20
Q

What are the three techniques to identify the infected host

A
  1. Forensic Identification
  2. Active Identification
  3. Manual Identification
21
Q

Why is it hard to find the original source of the malicious code

A

Malware can be transmitted automatically or accidentally by the infected users

22
Q

Why is forensic identification more advantageous

A

Data is collected beforehand and the applicable data is simply extracted from the complete data set

23
Q

What should a user do if the anti-malware software cannot disinfect infected files

A

The files need to be deleted or removed

24
Q

What should a user do if the files are deleted by the malware

A

Restore the files through backups