Types of Malware &Their Indicators Flashcards

1
Q

Ransomware

A

Locks users out of their files or device (typically uses encryption) until a ransom payment is made to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojan

A

Piece of software that disguises itself as a legitimate application, but is malware that creates a backdoor and must be copied and installed by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

Pieces of code that attempt to penetrate networks/computer systems that are self replicating (can spread on its own)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Potentially Unwanted Programs (PUP)

A

Programs that you agree to download and have an adverse effect on a computer’s security system or privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fileless Virus

A

Malware operating in only memory that continues to run until the device is powered off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command and Control

A

Attackers control a PC and use it to inject malware into other computers connected to the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bots

A

Functioning pieces of software that performs some task under the control of another program that can be malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptomalware

A

Malware that uses a system’s resources to mine cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logic bombs

A

Piece of code (typically installed by unauthorized user) that sits dormant for a period of time until some event or date invokes its malicious payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Software that spies on users, recording and reporting on their activities (keystrokes, softwae, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keyloggers

A

Software that logs all the keystrokes that a user enters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remote Access Trojan (RATs)

A

Programs that allow covert surveillance or unauthorized access to a victim PC and mimic similar behaviors to keylogger applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkit

A

Designed to modify the operation of the OS by obtaining root level access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

Malware that forcefully shows ads by modifying the victims system configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Backdoor

A

Used to create a converted channel for aiding adversaries that can be used to access and control the compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Five types of rootkits

A

Firmware
Virtual
Kernel
Library
Application