Section 3 Malware Infections Flashcards

1
Q

Method used by an attacker to access a victim’s machine.

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Method used by an attacker to gain access to a victim’s machine in order to infect it with malware.

A

Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware is placed on a website that you know your potential victims will access.

A

Watering Holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of compromised computers under the control of a master node.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Occurs when many machines target a single victim and attack them at the exact same time.

A

Distributed Denial of Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them.

A

Active Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’t able to access.

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non-malicious code that when invoked, displays an insider joke, hidden messages, or secret feature.

A

Easter Egg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious code that has been inserted inside a program and will execute only when certain conditions have been met.

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most commonly detected using a good antivirus software. Third party solutions like Norton or McAfee or using windows defender. Most viruses will take advantage of a user of a known exploit.

A

Virsues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Installed on a users machine that snoops on you. It collects data and sends it back to the owner. The user must maintain up to date security updates, windows defender has this capability.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware designed to install or run other types of malware embedded din a payload on an infected host.

A

Dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A piece of code that connects to the internet of retrieve additional tools after the initial infection by a dropper.

A

Downloader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any lightweight code designed to run an exploit on the target, which may include any type of code format from scripting languages to binary code.

A

Shellcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exploit technique that runs malicious code with the identification number of a legitimate process.

A

Code Injectioin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Exploit techniques that use standard system tools and packages to perform intrusions.

A

Living off the land