Section 2 Malware Flashcards

1
Q

Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virus that is stored in the first sector of a hard drive and is loaded into memory upon boot up.

A

Boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus embedded into a document and is executed when the document is opened by the user.

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus that infects an executable or application.

A

Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus that combines boot sector and program viruses to first attach itself to the boot sector and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer.

A

Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced version of an executed by altering the decryption module to avoid detection.

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus that is able to rewrite itself entirely before it attempts to infect a file

A

Metamorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Viruses that are using various different techniques to avoid detection by an antivirus software.

A

Stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses that have a layer of protection to confuse a program or person analyzing it.

A

Armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tricks a user into infecting their own machine.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A virus that encrypts its payload with the intention of making detecting the virus more difficult.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malicious software, like a virus, but is able to replicate itself without user interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malicious software that is disguised as a piece of harmless or desirable software.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provides the attacker with remote control of a victim computer and is the most commonly used types of trojan.

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware that restricts access to a victim’s computer system until a ransom is received.

A

Ransomware

17
Q

Malware that secretly gathers information about the user without their consent.

A

Spyware

18
Q

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences.

A

Grayware

19
Q

Software designed to gain administrative level control over a system without detection.

A

Rootkit

20
Q

Malicious code is inserted into a running process on a windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime.

A

DLL Injection

21
Q

An attack that relies on compromising the kernel mode device drivers that operate at a privileged or system level.

A

Driver Manipulation

22
Q

Activity that abuses electronic messaging systems, most commonly through email.

A

Spam

23
Q

The abuse of instant messaging systems, it works just like SPAM, except it’s going to abuse things such as text messages, social media chats, chatrooms in games, etc.

A

SPIM (Spam over Instant Messaging)