Malware Flashcards

1
Q

Require a user’s action to replicate and spread

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

advanced version of encrypted virus that changes itself everytime it is executed by altering the decryption module to evade detection.

A

Polymorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stored in the first section of the hard drive and loaded to memory on boot up.

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A virus embedded into another document and executed when it is open by the user.

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A virus that infects an executable or application.

A

Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

:A virus that combines boot and program viruses to first attach to the boot sector and sys files, then attacking other files on the device

A

Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A virus that is able to rewrite itself completely prior to attaching itself to a file.

A

Metamorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A virus that has a layer of protection to confuse a program or person to evade detection.

A

Armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a false warning about a computer virus typically sent by emails.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware that can replicate without any user’s action or consent.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malicious software disguised as harmless or desirable software.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide the attacker remote access or control of the infected device.

A

RAT, Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

utilizes a vulnerability in a device’s software to gain access then encrypts the files to hold them hostage for payment.

A

Ransomeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

malware that secretly gather information about the user without consent.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

displays advertisements based on the results of spyware.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

software designed to gain admin/root level control over a system without consent.

A

Rootkit

17
Q

Malware injected into running processes on a Windows machine by taking advantage of those libraries at run time.

A

DLL (Dynamic Link Library) Injection:

18
Q

placed between two components to intercept calls and redirect them.

A

Shim

19
Q

abuses of electronic messaging systems, primarily email.

A

SPAM

20
Q

spam over instant messaging

A

SPIM