Week 2 Flashcards

1
Q

______ is software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

________ changes its internal code to one of a set number
of predefined mutations whenever it is executed.

A

Oligomorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware code that completely changes from its original form whenever it is executed is known as __________.

A

polymorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_________ can actually rewrite its own code and thus appears different each time it is executed.

A

Metamorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Some malware has as its primary trait spreading rapidly to other systems in order to impact a large number of users.

A

Circulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Once the malware reaches a system through circulation, then it must “infect” or embed itself into that system.

A

Infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some malware has as its primary trait avoiding detection by concealing its presence from scanners.

A

Concealment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When __________ are the primary focus of malware, the focus is on what nefarious action(s) the malware performs.

A

Payload capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Three types of malware have the primary traits of circulation and/or infection.

A

viruses, worms, and Trojans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A biological virus is an agent that reproduces inside a cell. When a cell is infected by a virus, the virus takes over the operation of that cell, converting it into a virtual factory to make more copies of it.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Instead of inserting pieces of the decryption engine throughout the program code, some viruses split the malicious code itself into several parts (along with one main body of code), and then these parts are placed at random positions throughout the program code.

A

Split infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Instead of having a single “jump” instruction to the “plain” virus code, some armored viruses perform two actions to make detection more difficult.

A

Swiss cheese infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A second type of malware that has as its primary purpose to spread is a ______.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to ancient legend, the Greeks won the Trojan War by hiding soldiers in a large hollow wooden horse that was presented as a gift to the city of Troy.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A computer _____________ is an executable program that masquerades as performing a benign activity but also does something malicious.

A

Trojan horse (or just Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Different types of malware are designed to collect important data from the user’s computer and make it available to the attacker.

A

Collect Data

15
Q

__________ is a general term used to describe software that secretly spies on users by collecting information without their consent.

A

Spyware Spyware

16
Q

A __________ can be a small hardware device or a software program. As a hardware device, the keylogger is inserted between the computer keyboard connection and USB port.

A

keylogger

17
Q

___________ are programs installed on the computer that silently capture sensitive information.

A

Software keyloggers

18
Q

One of the newest and fastest-growing types of malware is ______.

A

Ransomware

19
Q

__________ prevents a user’s device from properly operating until a fee is paid.

A

Ransomware

20
Q

The payload of other types of malware deletes data on the computer.

A

Delete Data

21
Q

A _________ is computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event.

A

logic bomb

22
Q

The payload of some types of malware attempts to modify the system’s security settings so that more insidious attacks can be made.

A

Modify System Security

23
Q

One of the most popular payloads of malware today carried by Trojans, worms, and viruses is software that will allow the infected computer to be placed under the remote control of an attacker.

A

Launch Attacks