Malwar infections Flashcards

1
Q

Threat vector

example?

A

a method used to ACCESS victims machine.

exp: click on a link to deliver software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack vector

A

Method to access victims machine to infect it with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Watering Holes

A

malware placed on a website that users continue to go to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

typosquatting

A

a method of spoofing a website that contains malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet and zombies

A

a network of compromised computers (zombies) under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DDOS - Distributed Denial of Service

A

Many machines attack a services all at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Active interception

A

a computer placed between a sender and a receiver. can capture or modify traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privilage escalation

A

exploiting a design flaw or pug to pose as super user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are backdoors used for

A

used to bypass security and normal authentication function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote Acces Trojan

A

placed by an attacker as a backdooor to maintain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Easter Egg

A

non malicious code that when actioned displayed hidden message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logic bomb

A

maicious code that will execute when certain conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Double file extensions

A

ex: textfile.txt.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to clean up malware

A
  1. identify symptoms
  2. quarantine the systems
  3. disable system restore
  4. reboot in safe mode. run antivirus
  5. updates and scans
  6. enable restore and create new start point
  7. admin training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

exploit technique

A

specific method by which malware infects a target host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

steps APT uses for deliver malware

A
  1. Dropper- malware filelessly gets on the computer
  2. Maintain access
  3. strengthen access
  4. Actions on objects
  5. concealment
17
Q

shell code

A

lightweight code designed to run an exploit

18
Q

code injection

A

expoit technique that runs malicious code with id number of a legit process