Virus and Malware Types Flashcards

1
Q

Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of virus that is stored in the first sector of a hard drive and loaded into memory upon boot

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of virus that is embedded into a document and executed when the document is opened by the user

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus that infects an executable or program

A

Program Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Combination of boot sector and program virus - loads itself upon boot and can install itself in a program. Gives persistence and redundancy to the virus

A

Multipartite Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection

A

Polymorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus that is able to rewrite itself entirely before it attempts to infect a file - advanced version of polymorphic

A

Metamorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus that has a layer of protection to confuse a program or person analyzing it

A

Armored Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering that fakes a virus/infection in order to convince a user to run a program that contains actual malware

A

Hoax Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus that uses encryption to protect itself

A

Encrypted Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware that self-replicates without user interaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of malware that is disguised as a piece of harmless or desired software

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware that holds a user’s data/system hostage by restricting access until payment is given by user

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware that secretly gathers information on a user without consent

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware designed to gain administrative level control over a system without detection.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Activity that abuses electronic messaging systems, mostly email

A

Spam

17
Q

Taking advantage of a misspelled URL and directing the user to a potentially malicious page

A

Typosquatting

18
Q

the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers or to unknowingly install malware

A

Phishing

19
Q

Phishing involving voice calls

A

Vishing

20
Q

A type of phishing that targets an important individual like the CEO of an organization

A

Whaling

21
Q

type of phishing campaign that targets a specific person or group and often will include information known to be of interest to the target, such as current events or financial documents.

A

Spear Phishing

22
Q

Phishing through text messages

A

Smishing

23
Q

a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge, e.g., to send spam messages.

A

Botnet

24
Q

Mechanism used to bypass normal authentication and security functions

A

Backdoor

25
Q

Remote access trojans (RATs) are malware designed to allow an attacker to remotely control an infected computer.

A

RAT - Remote Access Trojan

26
Q

Malicious code that has been inserted inside a program and will execute only when certain conditions are met

A

Logic Bomb

27
Q

What is PUP

A

Potentially Unwanted Program- not specifically defined as malware (think of mac keeper)

28
Q

A malware-infected network host under remote control of a hacker is commonly referred to as:

A

Bot

29
Q

A technique used by certain types of malware to cause an error in a program and make it easier to run malicious code.

A

Buffer Overflow

30
Q

An older type of computer virus which doesn’t alter files and works by creating infected companion file with the exact same name as the legitimate program, but with different file extension.

A

Companion Virus

31
Q

A type of Trojan designed to transfer other malware onto a PC via Internet connection.

A

Downloader

32
Q

A computer virus that actively attacks an antivirus program in an effort to prevent detection.

A

Retrovirus

33
Q

A computer program not explicitly classified as malware by an antivirus software.

A

PUP