Section 5: Malware Flashcards

1
Q

What is malware?

A

Malware is malicious software designed to infiltrate computer systems and potentially damage them without user consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the categories of malware?

A

The categories of malware include viruses, worms, trojans, ransomware, spyware, rootkits, and spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

A virus attaches to clean files, spreads, and corrupts host files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm?

A

A worm is a standalone program that replicates and spreads to other computers without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a trojan?

A

A trojan disguises itself as legitimate software but grants unauthorized access when executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware?

A

Ransomware encrypts user data and demands ransom for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Spyware gathers user and system information without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a rootkit?

A

A rootkit hides the presence and activities of malware on a computer at the operating system level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spam in the context of malware?

A

Spam refers to unwanted messages often used as a vector to deliver other types of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between threat vector and attack vector?

A

A threat vector is the method used to infiltrate a victim’s machine, while an attack vector is the combination of the infiltration method and the infection process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some types of malware attacks?

A

Types of malware attacks include viruses, worms, trojans, ransomware, zombies and botnets, rootkits, backdoors and logic bombs, and keyloggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are zombies and botnets?

A

Zombies are compromised computers controlled remotely, and botnets are networks of these compromised computers used for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are indicators of a malware attack?

A

Indicators of a malware attack include account lockouts, concurrent session utilization, blocked content, impossible travel, resource consumption, and missing logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the specific types of viruses?

A

Variants of viruses include boot sector viruses, macro viruses, program viruses, multipartite viruses, encrypted viruses, polymorphic viruses, metamorphic viruses, stealth viruses, armored viruses, and hoax viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Remote Access Trojans (RATs)?

A

RATs are trojans that provide attackers with control over victim machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are preventive measures against ransomware?

A

Preventive measures include regular backups, software updates, security training, and Multi-Factor Authentication (MFA).

17
Q

What techniques do rootkits use?

A

Rootkits use techniques like Dynamic Link Library (DLL) injection and operate at the kernel level for deep access.

18
Q

What are keyloggers?

A

Keyloggers are tools that record keystrokes to capture sensitive information and can be either software-based or hardware-based.

19
Q

What is the difference between spyware and bloatware?

A

Spyware secretly collects information from users, while bloatware consumes system resources unnecessarily.

20
Q

What are exploitation techniques in malware?

A

Exploitation techniques involve malware exploiting vulnerabilities to penetrate and infect systems, sometimes using fileless techniques to evade detection.

21
Q

What is multi-stage deployment in malware?

A

Multi-stage deployment involves malware employing multiple stages, such as a ‘dropper’ to initiate infection and a downloader to retrieve additional malicious payloads.

22
Q

What are some methods for malware prevention and mitigation?

A

Methods include regular backups, security awareness training, anti-malware solutions, and system monitoring.