Domain 1.1 - Given a scenario, analyze indicators of compromise and determine the type of malware. Flashcards

1
Q

Describe an Armored Virus

A

Armored viruses cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe a Companion Virus

A

A companion virus attaches itself to legitimate programs and then creates a program with a different filename extension.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a Macro Virus affect?

A

Affects Microsoft office products (Word, Excel, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a Multipartite Virus infect?

A

It may attempt to infect your boot sector, infect all of your executable files, and destroy your application files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you remove a Phage Virus?

A

The only way to remove this virus is to reinstall the programs that are infected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a Polymorphic Virus

A

Polymorphic viruses and polymorphic malware of any type change form in order to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Retrovirus attack?

A

A retrovirus attacks or bypasses the antivirus software installed on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A stealth virus attempts to avoid detection by ________ itself from applications.

A

Masking

It may attach itself to the boot sector of the hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Ransomware Do?

A

RansomWare encrypts your hard drive. Then a third party requests payment to decrypt it. Usually through Bitcoin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the key feature of a worm?

A

A worm is Self-Replicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Trojan?

A

A virus disguised as a legitimate program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a RAT?

A

A Remote Access Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the goal of a RootKit?

A

The goal of a rootkit is to gain root access to a computer. In order to gain Escalated Privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a Key logger do?

A

It logs every key stroke and mouse click on an infected system. It then sends that info to the threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Spyware do?

A

monitors your activity then sends it back to whoever created the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DoS stands for

A

Denial of service

17
Q

How is a DoS attach different from a DDoS?

A

DoS is done with a single computer. A distributed Denial of service or DDoS is a denial of service using multiple computers to attack the target.

18
Q

What triggers a Logic Bomb?

A

Either a specific action, or timer.

For instance: Open a spreadsheet and go to the internet.

19
Q

What is a BackDoor?

A

The person who wrote the software intentionally or accidentally left a way for them to get back into the Kernel/Core of the software.

20
Q

An alert signals you that a server in your network has a program running on it that bypasses authorization. Which type of attack has occurred?

A. DoS
B. DDoS
C. Backdoor
D. Social engineering

A

An alert signals you that a server in your network has a program running on it that bypasses authorization. Which type of attack has occurred?

C. Backdoor

21
Q

You’re explaining the basics of security to upper management in an attempt to obtain an increase in the networking budget. One of the members of the management team mentions that they’ve heard of a threat from a virus that attempts to mask itself by hiding code from antivirus software. What type of virus is she referring to?

A. Armored virus
B. Malevolent virus
C. Worm
D. Stealth virus

A

You’re explaining the basics of security to upper management in an attempt to obtain an increase in the networking budget. One of the members of the management team mentions that they’ve heard of a threat from a virus that attempts to mask itself by hiding code from antivirus software. What type of virus is she referring to?

A. Stealth virus

22
Q

Your system has just stopped responding to keyboard commands. You noticed that this occurred when a spreadsheet was open and you connected to the Internet. Which kind of attack has probably occurred?

A. Logic bomb
B. Worm
C. Virus
D. ACK attack

A

Your system has just stopped responding to keyboard commands. You noticed that this occurred when a spreadsheet was open and you connected to the Internet. Which kind of attack has probably occurred?

A. Logic bomb

23
Q

What kind of virus could attach itself to the boot sector of your disk to avoid detection and report false information about file sizes?

A. Trojan horse virus
B. Stealth virus
C. Worm
D. Polymorphic virus

A

What kind of virus could attach itself to the boot sector of your disk to avoid detection and report false information about file sizes?

B. Stealth virus