Review 9 Flashcards

(15 cards)

1
Q

Which malware detection method aids in detecting new or unknown malware?

Question options:

Integrity checking

Heuristic Analysis

Scanning

Interception

A

Heuristic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which malware related law defines what computer related crimes are and ensures that these crimes can be punished?

Question options:

Sarbanes Oxley Act (SOX)

CAN-SPAM Act

USA Patriot Act

Computer Fraud and Abuse Act (CFAA)

A

Computer Fraud and Abuse Act (CFAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which malware component is basically a shell around the malware code that keeps the malware from being analyzed and reverse engineered?

Question options:

Obfuscator

Injector

Crypter

Exploit

A

Crypter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of malware shows the user warnings about potential harm that could happen if they don’t take some sort of action, such as purchasing a specific program to clean their system?

Question options:

Root Kit

Scareware

Trojan Horse

Ransomware

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which malware component is what performs the intended activity of the malware?

Question options:

Payload

Exploit

Malicious Code

Packer

A

Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of Trojan Horse communications channel violates the security policy on the infected system?

Question options:

Illicit

Covert

Backdoor

Overt

A

Covert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of Trojan Horse malware has the ability to change the code and modify the contents of a database or a website?

Question options:

Botnet

Backdoor

RAT

Defacement

A

Defacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of malware can open backdoors into the system it infects, providing the hacker with covert remote access?

Question options:

Backdoorware

Trojan Horse

Worm

Virus

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of Trojan Horse malware provides a hacker with remote desktop GUI and complete control over the system?

Question options:

Backdoor

RAT

Botnet

DDoS

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of malware analysis is the process of analyzing the malware by running it and observing how it behaves and its effects on the system?

Question options:

Dynamic Analysis

Code walking

Static analysis

Sheep dipping

A

Dynamic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____________ is the process of reverse-engineering a specific piece of malware in order to determine its origin, functionality, and potential impact

Question options:

Malware analysis

Malware reverse engineering

Reverse analysis

Crypto analysis

A

Malware analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of virus infects files created by Microsoft Office or similar programs?

Question options:

Macro

Companion

Polymorphic

Multipartite

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What term describes malware that is entirely self-replicating, and uses the power of networks, malware, and speed to spread?

Question options:

Virus

Worm

Ransomware

Trojan Horse

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Trojan Horse malware utilizes port 485?

Question options:

WannaCry

Tiny Telnet Server

RAT

Poison Ivy

A

WannaCry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which malware component uses different techniques to conceal the malware?

Question options:

Injector

Crypter

Obfuscator

Exploit

A

Obfuscator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly