comp security exam 3 Flashcards

1
Q

Malware

A

Malicious software designed to harm or exploit any programmable device or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

Self-replicating malware that spreads across networks without user action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virus

A

Malware that attaches to files and spreads when the host file is executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

Software that secretly collects user information and sends it to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wiper

A

Malware that deletes or “wipes” data to render systems unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of Service

A

Attack that overwhelms resources to make a service unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backdoor

A

Hidden method for bypassing normal authentication to access systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

Malware that encrypts data and demands payment for its release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infiltration

A

Initial compromise of a system by malware or attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Exfiltration

A

Unauthorized transfer of data out of a compromised system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trigger (Logic Bomb)

A

Hidden code set to execute malicious action when specific conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dropper

A

multi-stage dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bot

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger

A

Software that records keystrokes to capture sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Windows Hooks

A

API-level intercepts of OS events used by some malware to monitor activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero-day Vulnerability

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Zero-click Exploit

A

Exploit that requires no user interaction to compromise a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

File Infector

A

Malware that infects and modifies executable files on disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

USB and infected firmware

A

Malware embedded in USB device firmware to infect hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Autorun

A

Feature that automatically executes code from removable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data leakage

A

Unintentional or malicious exfiltration of sensitive data.

22
Q

Macro Viruses

A

Viruses written in macro languages (e.g.

23
Q

Social Engineering

A

Manipulating people into performing actions or divulging confidential information.

24
Q

Deceptive download

A

Malicious software disguised as legitimate download.

25
Deceptive pop-up
Fake alert that tricks users into downloading malware.
26
Phishing
Fraudulent emails designed to steal credentials or deliver malware.
27
Spear Phishing
Targeted phishing attack against specific individuals or organizations.
28
Smishing
Phishing via SMS/text messages.
29
Hiding Malicious URLs
Techniques to obscure harmful links (e.g.
30
Honeypots
Decoy systems set up to attract and analyze attackers.
31
Trojan Horse
remote access trojan
32
Overt vs. Covert Purpose
Overt malware announces itself; covert hides its presence or intent.
33
Startup Services
Malware that installs itself as a service to persist across reboots.
34
Bootkit
Rootkit that infects the boot loader or boot sector to gain control before OS loads.
35
Rootkit
Software that hides the existence of processes
36
Kernel-mode
User-mode
37
File-less malware
Malware that resides only in memory and leaves no files on disk.
38
Typosquatting
Registering domain names similar to popular sites to trick users.
39
Masquerading links
Using misleading link text or hidden redirects to disguise malicious URLs.
40
Malicious QR codes
QR codes that direct scanners to malware-hosting or phishing sites.
41
SPF (Sender Policy Framework)
DNS record that specifies which mail servers can send on behalf of a domain.
42
DKIM (DomainKeys Identified Mail)
Email authentication using cryptographic signatures in headers.
43
DMARC (Domain-based Message Authentication
Reporting
44
Signature-based Detection
Antivirus method that matches files against known malware signatures.
45
Behavior-based Detection (Heuristic Analysis)
Detecting malware by monitoring suspicious runtime behavior.
46
Signature Scanning
Scanning files for known byte-patterns of malware.
47
Encrypted malware
Malware whose code is encrypted to evade signature detection.
48
Packing
packer
49
Polymorphic Virus
Malware that mutates its code on each infection to evade detection.
50
Static Heuristic Analysis
Analyzing code structure without executing to detect suspicious patterns.
51
Dynamic Heuristic Analysis
Running code in a sandbox to detect malicious actions at runtime.