Malware Flashcards

1
Q

Software designed to infiltrate a computer system and possibly damage it
without the user’s knowledge or consent
* Viruses
* Worms
* Trojan horses
* Ransomware
* Spyware
* Rootkits
* Spam

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious code that runs on a machine without the user’s knowledge and
infects the computer when executed
________require a user action in order to reproduce and spread

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

viruses are stored in the first sector of a hard
drive and are loaded into memory upon boot up

A

Boot Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus embedded into a document and is executed when
the document is
opened by the user

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

viruses infect an executable or application

A

Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus that combines boot and program viruses to first
attach itself to the boot sector and system files before
attacking other files on the computer

A

MultiPartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced version of an encrypted virus that changes itself
every time it is executed by altering the decryption
module to avoid detection

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus that is able to rewrite itself entirely before it
attempts to infect a file (advanced version of polymorphic
virus)

A

Metamorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

viruses have a layer of protection to confuse a
program or person analyzing it

A

Armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious software, like a virus, but is able to replicate itself without user
interaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malicious software that is disguised as a piece of harmless or desirable
software

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provides the attacker with remote control of a victim computer and is the
most commonly used type of Trojan

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware that restricts access to a victim’s computer system until a
ransom is received

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware that secretly gathers information about the user without their
consent

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Displays advertisements based upon its spying on you

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software that isn’t benign nor malicious and tends to behave improperly
without serious consequences

A

Grayware

17
Q

Software designed to gain administrative level control over a system
without detection

A

Rootkit

18
Q

Malicious code is inserted into a running process on a Windows machine
by taking advantage of Dynamic Link Libraries that are loaded at runtime

A

DLL Injection

19
Q

An attack that relies on compromising the kernel-mode device drivers
that operate at a privileged or system level

A

Driver Manipulation

20
Q

Activity that abuses electronic messaging systems, most commonly
through email

A

Spam