Review 9 Flashcards
(15 cards)
Which malware detection method aids in detecting new or unknown malware?
Question options:
Integrity checking
Heuristic Analysis
Scanning
Interception
Heuristic Analysis
Which malware related law defines what computer related crimes are and ensures that these crimes can be punished?
Question options:
Sarbanes Oxley Act (SOX)
CAN-SPAM Act
USA Patriot Act
Computer Fraud and Abuse Act (CFAA)
Computer Fraud and Abuse Act (CFAA)
Which malware component is basically a shell around the malware code that keeps the malware from being analyzed and reverse engineered?
Question options:
Obfuscator
Injector
Crypter
Exploit
Crypter
What type of malware shows the user warnings about potential harm that could happen if they don’t take some sort of action, such as purchasing a specific program to clean their system?
Question options:
Root Kit
Scareware
Trojan Horse
Ransomware
Scareware
Which malware component is what performs the intended activity of the malware?
Question options:
Payload
Exploit
Malicious Code
Packer
Payload
Which type of Trojan Horse communications channel violates the security policy on the infected system?
Question options:
Illicit
Covert
Backdoor
Overt
Covert
Which type of Trojan Horse malware has the ability to change the code and modify the contents of a database or a website?
Question options:
Botnet
Backdoor
RAT
Defacement
Defacement
Which type of malware can open backdoors into the system it infects, providing the hacker with covert remote access?
Question options:
Backdoorware
Trojan Horse
Worm
Virus
Trojan Horse
Which type of Trojan Horse malware provides a hacker with remote desktop GUI and complete control over the system?
Question options:
Backdoor
RAT
Botnet
DDoS
RAT
Which type of malware analysis is the process of analyzing the malware by running it and observing how it behaves and its effects on the system?
Question options:
Dynamic Analysis
Code walking
Static analysis
Sheep dipping
Dynamic Analysis
____________ is the process of reverse-engineering a specific piece of malware in order to determine its origin, functionality, and potential impact
Question options:
Malware analysis
Malware reverse engineering
Reverse analysis
Crypto analysis
Malware analysis
What type of virus infects files created by Microsoft Office or similar programs?
Question options:
Macro
Companion
Polymorphic
Multipartite
Macro
What term describes malware that is entirely self-replicating, and uses the power of networks, malware, and speed to spread?
Question options:
Virus
Worm
Ransomware
Trojan Horse
Worm
Which Trojan Horse malware utilizes port 485?
Question options:
WannaCry
Tiny Telnet Server
RAT
Poison Ivy
WannaCry
Which malware component uses different techniques to conceal the malware?
Question options:
Injector
Crypter
Obfuscator
Exploit
Obfuscator