Section 4 Flashcards

(51 cards)

1
Q

What is known as an umbrella term?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What part of malware is illegal?

A

Using the Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is making malware illegal?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is having malware illegal?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is using malware illegal?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who would be free to create malware but if you put it on someone else’s system it becomes illegal?

A

White Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can create malware and use it on your own system. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

6.549 variants of what?

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the largest malware researchers in the world?

A

Symantec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Different kinds of malware:
1.
2.
3.

A
  1. viruses
  2. trojans
  3. worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A virus is a type of malware. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do viruses need human interaction to spread?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open email, click on link, download a file all need human interaction and allow what to spread?

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are numerous possible outcomes with viruses. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Floppy discs and hard drive all have what?

A

Boot Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Viruses are designed specifically for what? The virus activates itself as part of the system.

A

Boot Sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Elk Cloner is a what?

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Decided to prank his friends where it would attach itself to a floppy disk and spread from there. The “50th” time you accessed the disk there would be a poem and it spread out of control. Because it was in the boot sector it became very difficult to get rid of.

A

Elk Cloner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Microsoft office suite has its own macro functions, and you can create viruses specifically designed to spread using the macro functions.

A

Macro Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Different viruses have different goals (annoying, destroy data, steal data, etc.) True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hides within something?

22
Q

Program that records the buttons that are hit on a keyboard and either stores them for later retrieval or sends them to the bad guys.

23
Q

Webcams, microphones. You accidentally get a trojan on your laptop they may have access to the camera and microphone. Big tech people recently were filmed and interviewed at his desk and his laptop and had post it notes on his camera to keep people from seeing everything.

A

File/ Peripheral Access

24
Q

Infect people and make them be your what?

25
When police get mad at you for doing something, they will actually get mad at the people who I infected. True or False
True
26
Payloads can be many different things and one example is a key logger. True or False
True
27
Digital pirate and want to download a cracked copy of a video game and someone had hidden a trojan in it. True or False
True
28
Do worms need human interaction?
No
29
What spreads VERY quickly and their lifetime is only hours?
Worms
30
In 1988 who accidentally launched a worm and took down a significant portion of the internet.
Morris worm
31
What resulted in the first CERT?
Morris Worm
32
CERT stands for what?
Computer Emergency Response Team
33
Who are teams that are specifically designed to fix problems or diagnose issues? If anyone has a major cyber event they will come out and try to figure out what went wrong and make sure it never happens again.
CERT
34
You just launch them and they go. They can only have a few hours because of how fast they spread.
Worms
35
A kind of virus/trojan and you get a piece of malware on your computer and it allows someone else to control your machine.
Botnet
36
A Bot Master will send out a bot virus and it gets infected on your computer and the more it infects the larger it grows. True or False
True
37
The larger botnet on record was how many computers?
A few million
38
The botnet virus sits quietly on your machine and contacts a server somewhere and it listens and waits. If the master wants to do something he can send or post a command on the server and all the bots do whatever the command is. True or False
True
39
One of the more common uses of botnet is what?
Distributed Denial of Service Attack
40
If I get upset at PayPal if I have a few thousand bots at my command to send amazon junk data or invalid requests or anything that occupies the PayPal servers so much that they don't have the resources to deal with the traffic. The best scenario for the bad guy is that the server shuts down. The best case for the service is that their service runs even if just slow. True or False
True
41
Child pron installing of keeping them on your own computer you can keep them stored on the other peoples computer. To access them you would get on the botnet to look at them. This is using what?
Hidden Files
42
Spam creators will use a botnet to send spam. True or False
True
43
Spam: If there are 10,000 computers at their command, they will keep sending them and no one can block them. True or False
True
44
Describes all the other stuff connected to the internet. Air conditioning, refrigerators, doorbells. All kins of things connected to the internet that is not computer or phones. Someone has created a botnet and doing an attack.
Internet of things
45
People who create internet of things are not thinking about what?
Security
46
Now there are more devices connected to the internet than their are on the earth.
True
47
Download a program accidentally, usually through a trojan or a bad link. It encrypts your hard drive and displays an image that they are the police and they demand payment through bitcoin or another harder to trace payment. You can format and reinstall your hard drive or lose everything encrypted. You can pay the money and they may or may not fix your computer.
Ransomeware
48
70% of businesses pay, 20% over 40k. True or False
True
49
Ransomeware has become a money maker for these people. It is one of the reasons why a backup is important.
True
50
You should have on site and off site back ups. True or False
True
51
A lot of these overlap. It might be a trojan that delivers ransomware. One infected email, one bad link on a website that may have a piece of malware that falls into multiple categories. True or False
True