Computer Viruses Flashcards

(13 cards)

1
Q

Non-Resident / File Infector

A

The virus is contained within a host executable file and runs with the host process. The virus will try to infect other process images on persistent storage and perform other payload actions. It then passes control back to the host program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Memory Resident

A

When the host file is executed, the virus creates a new process for itself in memory. The malicious process remains in memory, even if the host process is terminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Boot

A

The virus code is written to the disk boot sector or the partition table of a fixed disk or USB media and executes as a memory-resident process when the OS starts, or the media is attached to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Script and Macro Viruses

A

The malware uses the programming features available in local scripting engines for the OS and/or browser, such as PowerShell, Windows Management Instrumentation (WMI), JavaScript, Microsoft Office documents with Visual Basic for Applications (VBA) code enabled, or PDF documents with JavaScript enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multipartite

A

Term used for viruses that use multiple vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Polymorphic

A

Term used for viruses that can dynamically change or obfuscate their code to evade detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Code Red worm

A

The Code Red worm was able to infect early versions of Microsoft’s IIS web server software via a buffer overflow vulnerability. It then scanned randomly generated IP ranges to try and infect other vulnerable IIS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Conficker worm

A

The Conficker worm illustrated the potential for remote code execution and memory-resident malware to effect highly potent attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless Malware

A

Fileless malware does not write its code to disk.

Fileless malware uses lightweight shellcode to achieve a backdoor mechanism on the host.

Fileless malware may use “live off the land” techniques rather than compiled executables to evade detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Supercookie

A

A supercookie is a means of storing tracking data in a non-regular way, such as saving it to a cache without declaring the data to be a cookie or encoding data into header requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Beacon

A

A beacon is a single-pixel image embedded into a website. While invisible to the user, the browser must request to download the pixel to load the site, giving the beacon host the opportunity to collect metadata, perform browser fingerprinting, and potentially run tracking scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Covert Channel

A

A type of attack that subverts network security systems and policies to transfer data without authorization or detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkit

A

Class of malware that modifies system files, often at the kernel level, to conceal its presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly