Malware/Threats Flashcards

1
Q

What type of file is a virus generally attached to?

A

.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware capable of traveling without human interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Creates backdoors to allow malicious access.

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoS, DDoS

A

(Distributed) Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Traffic DoS attack

A

Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bandwidth DDoS attack

A

This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application DoS attack

A

Application-layer data messages can deplete resources in the application layer, leaving the target’s system services unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ransomware do?

A

Ransomeware encrypts key files and holds for ransom, in many cases, bitcoin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the delivery vector for Ransomware?

A

Ransomeware can be delivered through email, script files, zip files, and internet downloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you defend against ransomware?

A
Never open spam
Run updates
use antivirus
turn off external apps
keep external data backups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bombs

A

also called slag code. Will only function maliciously under circumstances, time or course of action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly