2.3 Flashcards
(31 cards)
How does a trojan horse work ?
Software that pretends to be something else.
Does a Trojan horse replicate ?
Typically, no.
What does a rootkit do ?
Modifies core system files
What makes rootkits particulary dangerous ?
Invisible to the OS and therefore can be invisible to standard AV suites.
What is the standard way to remove a rootkit ?
Use a removal tool specifically designed for the Rootkit in questions.
What is a virus ?
Malware that can replicate itself
What prevention method can stop unasigned software from running during the boot process ?
Secure Boot found in most modern UEFI.
How is Spyware typically installed ?
Peer to Peer or fake software ads.
What are some examples of Spyware ?
Browser monitor and Keyloggers.
Why are keyloggers particulary dangerous ?
Your keystrokes are in the clear i.e. not encrypted.
How does Ransomware work ?
Malware encrypts your data files. You must then pay for the decryption key.
How do crypto miners work ?
Hijack some of your CPU for usage in mining crypto currencies.
What is the last ditch method for recovery when resolving a malware issue ?
Windows Recovery Environment.
Why is the Windows Recovery Environment a very powerful tool for resolving Malware issues ?
Offers complete control before the system can boot.
Enable/disable services, remove from the cmd prompt or even wipe if necessary.
What is the best antiphishing tool ?
(Educating) The User.
Give an example of testing end users against phishing attempts ?
Send a phishing email. Find out who clicks and gives up information.
When reinstalling the OS, what’s the quickest way to install the new system ?
Recover from a prebuilt image.
What option provides the most effective means for malware removal?
OS reinstallation.
What type of virus infects the storage drive area containing the necessary data and code used to start the OS ?
Boot sector virus.
What is the likely cause of system slow down, files disappearing, or loss disk space ?
A virus
What is WinRE ?
Windows recovery enviroment.
What does the Reset This PC option in Windows recovery enviroment do ?
OS reinstall, keeps files.
What type of malware is designed to provide unauthorized access to a system by creating a backdoor?
Trojan
What type of malware is designed to modify a system’s operating system to hide its presence and evade detection?
Rootkit