Malware Attacks- Lesson 2 Flashcards

1
Q

is an umbrella term for “malicious software”. Describes any malicious program or code that is harmful to systems

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware is short for ____

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware seek to…? (4)

A
  1. invade
  2. Damage, or disable
  3. Steal
  4. Delete or alter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

displays unwanted software designed to throw advertisements up on your screen.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malware that secretly observes the computer user’s activities without permission and reports it to the software’s author.
Collects information about users’ activities without their knowledge or consent.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware that records all the user’s keystrokes on the keyboard.
monitors user activity.

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do keyloggers can be inserted into a system through phishing, social engineering or malicious downloads?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

software that gives malicious actors remote control of a victim’s computer with full administrative privileges.

A

Rootkit

!can also conceal other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit, also known as ____

A

“root” access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a piece of code that inserts itself into an application and executes when the app is running.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

target vulnerabilities in operating systems to install themselves into networks.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

can spread across systems on their own. Self-replicating

A

Gummy Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It usually represents itself as something useful in order to trick you.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cannot execute or reproduce unless the app it has infected is running.
Worm, Virus, or Trojan?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

require users to download them in order to activate.
Worm, Virus or Trojan?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to regain access.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

two most common ways that malware accesses your system are the ____ and ____?

A

Internet and email

18
Q

What type of malware is designed to steal sensitive information such as login credentials?

A

Trojan
or
Adware

19
Q

type of malware that is designed to spread through USB drives

A

Worm

(kala ko nga Trojan or Virus eh)

20
Q

What is the most common method of distributing malware?

A

email attachments

21
Q

what kind of malware is:

RobinHood?

A

Ransomware

22
Q

what kind of malware is:

DarkHotel?

23
Q

what kind of malware is:

Emotet?

24
Q

what kind of malware is:

Stuxnet

25
# what kind of malware is: Zacinlo
**Rootkit**
26
# what kind of malware is: Olympic Vision
**Keylogger**
27
# what kind of malware is: Brain
**Virus**
28
# what kind of malware is: Melissa
**Virus**
29
# what kind of malware is: WannaCry
**Ransomware**
30
# what kind of malware is: Zeus
**Trojan**
31
# what kind of malware is: Pegasus
**Spyware**
32
# what kind of malware is: Shlayer
**Trojan**
33
# what kind of malware is: Back Office
**Rootkit**
34
# Answer the ff: An Adware can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * **Steal- Yes** * Damage- No * Disable- No * Alter- No * Delete- No
35
# Answer the ff: A Spyware can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * **Steal- Yes** * Damage- No * Disable- No * Alter- No * Delete- No
36
# Answer the ff: A Rootkit can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * **Steal- Yes** * **Damage- Yes** * **Disable- Yes** * **Alter- Yes** * **Delete- Yes**
37
# Answer the ff: A Keylogger can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * **Steal- Yes** * Damage- No * Disable- No * Alter- No * Delete- No
38
# Answer the ff: A Virus can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * **Steal- Yes** * **Damage- Yes** * **Disable- Yes** * **Alter- Yes** * **Delete- Yes**
39
# Answer the ff: A Worm can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * **Steal- Yes** * **Damage- Yes** * **Disable- Yes** * **Alter- Yes** * **Delete- Yes**
40
# Answer the ff: A Trojan can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * **Steal- Yes** * Damage- No * Disable- No * **Alter- Yes** * **Delete- Yes**
41
# Answer the ff: A Ransomware can: * Invade? * Steal? * Damage? * Disable? * Alter? * Delete?
* **Invade- Yes** * Steal- No * Damage- No * **Disable- Yes** * Alter- No * Delete- No