MODULE 7: Malware Threats Flashcards
What common technique to deliver malware over the web involves attackers tricking users into clicking on innocent looking webpages but are actually malicous?
maltervising
spam emails
black hat search optimization
social engineered click jacking
social engineered click jacking
What component of malware is a program that conceals its code and intended purpose via various techniques, and thus, makes it hard for security mechanisms to detect or remove it?
dropper
injector
obfuscator
packer
obfuscator
What type of network attack is where an attacker gains unauthorized access to a target network and remains undetected for a long period of time? The main objective is obtaining sensitive info, not sabotage.
DDOS
APT (advanced Persistent Threat)
XXS
SQL Injection
APT (advanced Persistent Threat)
What describes the level up to which an APT attack remains undetected in the target’s network?
Risk Tolerance
Timeliness
Attack Origination Point
Actions
Risk Tolerance
What type of attack is multi-phased to include reconnaissance, gaining access, discovery, capture, and data exfiltration?
DDOS
Phishing
APT
Botnet
APT
What stage in the APT lifecycle includes the deployment of malware and establishment of an outbound connection?
Persistence
Cleanup
Preparation
Initial intrusion
Initial Intrusion
What describes a program in which the malicious or harmful code is contained inside apparently harmless programming or data in such a way that the code can get control and cause damage? This type of program creates a covert communication channel between the attacker and target computer.
Virus
Trojan
Worm
Rootkit
Trojan
Remote access _______, backdoor _______, botnet _______, and defacement _______ are all categories of what type of attack program?
Virus
Worm
Trojan
Trojan
What type of traojan gives remote full control of a target computer, provides covert surveillance, usually provides higher privs than the device owner has (SYSTEM/root), usually undetected until activated, often delivered by drive-by downloads?
Botnet Trojan
RAT (Remote Access Tool) Trojan
Backdoor Trojan
Defacement Trojan
RAT (Remote Access Tool) Trojan
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to “www.MyPersonalBank.com”, the user is directed to a phishing site. Which file does the attacker need to modify?
A. Boot.ini
B. Sudoers
C. Networks
D. Hosts
D. Hosts
What operates via tunneling methods and are mostly employed by attackers to evade firewalls in target networks and deliver and hide Trojans in an undetectable protocol?
Examples of tools used to create these are Ghost Tunnel V2 and ELECTRICFISH.
SSH Tunnels
Covert Channels
DNS Tunnels
Covert Channels
What is a program that is intended to harm a target computer? Runs, replicates, and activates without the user’s knowledge and requires human interaction to spread?
Virus
Worm
Trojan
Virus
System or Boot Sector File and multipartite Macro and Cluster Stealth/Tunneling Sparse Infector Polymorphic Cavity/Overwriting FAT/Logic Bomb and Email/Armored
are all categories of what?
Worm
Trojan
Virus
Virus
What type of virus works by using macro features inside microsoft office apps such as word and excel?
Multipartite
Polymorphic
Macro
Armored
Macro
What type of virus consists of a file virus and boot sector virus? Infects both at the same time.
Macro
Multipartite
Polymorphic
Stealth
Multipartite Virus