Other Malware Types 2.4 Flashcards

1
Q

Keyloggers

A
  • A piece of software that logs all the keystrokes a user enters on their keyboard
  • Not all keyloggers are malicious
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious Keyloggers

A
  • Unknown to the user
  • Not under the user’s control
  • Circumvents encryption protections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Keyloggers Other Data Logging

A
  • Clipboard logging
  • Screen logging
    -Instant messages
  • Search engine queries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logic Bomb

A
  • Waits for a predefined event or timeframe to invoke malicious payload
  • Difficult to detect
  • Has code that has not been seen before on other systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventing Logic Bombs

A
  • Implement processes and procedures that limit the change to a system.
  • Set up monitoring that alerts when a change has been implemented.
  • Constant monitoring of who has access to what systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkits

A
  • Malware
  • Modifies core system files
  • Invisible to the operating system
  • Invisible to antirvus software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Removing Rootkits

A
  • Use a anti-malware scan to look for the unusual
  • Use a remover specific to the rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Boot Security/Unified Extensible Fireware Interface (UEFI)

A
  • Blocks malware that attempts to alter the boot process
  • Attests the drivers and OS have not been changed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly