Section 2 Flashcards

1
Q

Software designed to infiltrate a computer system and possibly damage it
without the user’s knowledge or consent

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the seven types of malware?

A

● Viruses
● Worms
● Trojan horses
● Ransomware
● Spyware
● Rootkits
● Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The following describes which type of malware?

Malicious code that runs on a machine without the user’s knowledge and
infects the computer when executed. These require a user action in order to reproduce and spread.

“Code that infects a computer when a file is opened or executed”

A

Virsues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The following describes which type of malware?

Malicious software, like a virus, but is able to replicate itself without user
interaction. They self-replicate and spread without a user’s consent or action. They can cause disruption to normal network traffic and computing
activities

“Acts like a virus but can self-replicate”

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The following describes which type of malware?

Malicious software that is disguised as a piece of harmless or desirable
software. They perform desired functions and malicious functions.

“Appears to do a desired function but also does something malicious”

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following describes which type of malware?

Malware that restricts access to a victim’s computer system until a
ransom is received. This uses a vulnerability in your software to gain access and then
encrypts your files.

“Takes control of your computer or data unless you pay”

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The following describes which type of malware?

Malware that secretly gathers information about the user without their
consent. Captures keystrokes made by the victim and takes screenshots that are
sent to the attacker

“Software that collects your information without your consent”

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The following describes which type of malware?

Software designed to gain administrative-level control over a system
without detection. These are activated before booting the operating system and are difficult to detect.

“Gains administrative control of your system by targeting boot loader or
kernel”

A

Root Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The following describes which type of malware?

Activity that abuses electronic messaging systems, most commonly through email. These often exploit a company’s open mail relays to send their messages

“Abuse of electronic messaging systems”

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two types of spyware?

A

Adware
Grayware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is adware?

A

Displays advertisements based upon its spying on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is grayware?

A

Software that isn’t benign nor malicious and tends to behave improperly
without serious consequences

*** Grayware is commonly referred to as potentially unwanted programs or PUPs. Those are all the applications that perform activities that can slow down the user’s devices. Most common grayware exists for advertising or adware and spyware which tracks and records the user information and behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ is commonly used by rootkits to maintain their persistent control

A

DLL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DLL injection?

A

Malicious code is inserted into a running process on a Windows machine
by taking advantage of Dynamic Link Libraries that are loaded at runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a type of trojan horse?

A

Remote Access Trojan (RAT)
▪ Provides the attacker with remote control of a victim computer and is the
most commonly used type of Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 10 different kinds of viruses?

A

● Boot sector
● Macro
● Program
● Multipartite
● Encrypted
● Polymorphic
● Metamorphic
● Stealth
● Armored
● Hoax

17
Q

What is a boot sector virus?

A

Boot sector viruses are stored in the first sector of a hard
drive and are loaded into memory upon boot up

18
Q

What is a macro virus?

A

Virus embedded into a document and is executed when
the document is opened by the user

19
Q

What is a program virus?

A

Program viruses infect an executable or application

20
Q

What is a multipartite virus?

A

Virus that combines boot and program viruses to first
attach itself to the boot sector and system files before
attacking other files on the computer

21
Q

What is an encrypted virus?

A

Virus that encrypts its contents to avoid allowing access to its code

22
Q

What is a polymorphic virus?

A

Advanced version of an encrypted virus that changes itself
every time it is executed by altering the decryption module
to avoid detection

23
Q

What is a metamorphic virus?

A

Virus that is able to rewrite itself entirely before it
attempts to infect a file (advanced version of polymorphic
virus)

24
Q

What is a stealth virus?

A

A category of viruses trying to protect itself. This include encrypted, polymorphic and metamorphic viruses.

25
Q

What is an armored virus?

A

Armored viruses have a layer of protection to confuse a
program or person analyzing it

26
Q

What is a hoax virus?

A

Not a virus in the traditional sense. Attempts to trick a user into infecting their own machine.