Section 4 Flashcards

1
Q

What is known as an umbrella term?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What part of malware is illegal?

A

Using the Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is making malware illegal?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is having malware illegal?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is using malware illegal?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who would be free to create malware but if you put it on someone else’s system it becomes illegal?

A

White Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can create malware and use it on your own system. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

6.549 variants of what?

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the largest malware researchers in the world?

A

Symantec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Different kinds of malware:
1.
2.
3.

A
  1. viruses
  2. trojans
  3. worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A virus is a type of malware. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do viruses need human interaction to spread?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open email, click on link, download a file all need human interaction and allow what to spread?

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are numerous possible outcomes with viruses. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Floppy discs and hard drive all have what?

A

Boot Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Viruses are designed specifically for what? The virus activates itself as part of the system.

A

Boot Sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Elk Cloner is a what?

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Decided to prank his friends where it would attach itself to a floppy disk and spread from there. The “50th” time you accessed the disk there would be a poem and it spread out of control. Because it was in the boot sector it became very difficult to get rid of.

A

Elk Cloner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Microsoft office suite has its own macro functions, and you can create viruses specifically designed to spread using the macro functions.

A

Macro Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Different viruses have different goals (annoying, destroy data, steal data, etc.) True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hides within something?

A

Trojans

22
Q

Program that records the buttons that are hit on a keyboard and either stores them for later retrieval or sends them to the bad guys.

A

keyloggers

23
Q

Webcams, microphones. You accidentally get a trojan on your laptop they may have access to the camera and microphone. Big tech people recently were filmed and interviewed at his desk and his laptop and had post it notes on his camera to keep people from seeing everything.

A

File/ Peripheral Access

24
Q

Infect people and make them be your what?

A

Proxy

25
Q

When police get mad at you for doing something, they will actually get mad at the people who I infected. True or False

A

True

26
Q

Payloads can be many different things and one example is a key logger. True or False

A

True

27
Q

Digital pirate and want to download a cracked copy of a video game and someone had hidden a trojan in it. True or False

A

True

28
Q

Do worms need human interaction?

A

No

29
Q

What spreads VERY quickly and their lifetime is only hours?

A

Worms

30
Q

In 1988 who accidentally launched a worm and took down a significant portion of the internet.

A

Morris worm

31
Q

What resulted in the first CERT?

A

Morris Worm

32
Q

CERT stands for what?

A

Computer Emergency Response Team

33
Q

Who are teams that are specifically designed to fix problems or diagnose issues? If anyone has a major cyber event they will come out and try to figure out what went wrong and make sure it never happens again.

A

CERT

34
Q

You just launch them and they go. They can only have a few hours because of how fast they spread.

A

Worms

35
Q

A kind of virus/trojan and you get a piece of malware on your computer and it allows someone else to control your machine.

A

Botnet

36
Q

A Bot Master will send out a bot virus and it gets infected on your computer and the more it infects the larger it grows. True or False

A

True

37
Q

The larger botnet on record was how many computers?

A

A few million

38
Q

The botnet virus sits quietly on your machine and contacts a server somewhere and it listens and waits. If the master wants to do something he can send or post a command on the server and all the bots do whatever the command is. True or False

A

True

39
Q

One of the more common uses of botnet is what?

A

Distributed Denial of Service Attack

40
Q

If I get upset at PayPal if I have a few thousand bots at my command to send amazon junk data or invalid requests or anything that occupies the PayPal servers so much that they don’t have the resources to deal with the traffic. The best scenario for the bad guy is that the server shuts down. The best case for the service is that their service runs even if just slow. True or False

A

True

41
Q

Child pron installing of keeping them on your own computer you can keep them stored on the other peoples computer. To access them you would get on the botnet to look at them. This is using what?

A

Hidden Files

42
Q

Spam creators will use a botnet to send spam. True or False

A

True

43
Q

Spam: If there are 10,000 computers at their command, they will keep sending them and no one can block them. True or False

A

True

44
Q

Describes all the other stuff connected to the internet. Air conditioning, refrigerators, doorbells. All kins of things connected to the internet that is not computer or phones. Someone has created a botnet and doing an attack.

A

Internet of things

45
Q

People who create internet of things are not thinking about what?

A

Security

46
Q

Now there are more devices connected to the internet than their are on the earth.

A

True

47
Q

Download a program accidentally, usually through a trojan or a bad link. It encrypts your hard drive and displays an image that they are the police and they demand payment through bitcoin or another harder to trace payment. You can format and reinstall your hard drive or lose everything encrypted. You can pay the money and they may or may not fix your computer.

A

Ransomeware

48
Q

70% of businesses pay, 20% over 40k. True or False

A

True

49
Q

Ransomeware has become a money maker for these people. It is one of the reasons why a backup is important.

A

True

50
Q

You should have on site and off site back ups. True or False

A

True

51
Q

A lot of these overlap. It might be a trojan that delivers ransomware. One infected email, one bad link on a website that may have a piece of malware that falls into multiple categories. True or False

A

True