5. Malware Flashcards

(29 cards)

1
Q

What is a computer virus?

A
  • Self-replicates
  • Spreads rapidly
  • May or may not have a malicious payload

Viruses can propagate through various methods, including network connections and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a virus typically spread?

A
  • Finds a network connection and copies itself to other hosts
  • Mails itself to everyone in the host’s address book

The first method requires programming skill, while the second requires less.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary reason for the commonality of e-mail propagation of viruses?

A

Microsoft Outlook is easy to work with

Just five lines of code can cause Outlook to send e-mails covertly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the types of viruses mentioned.

A
  • Macro
  • Boot Sector
  • Multi-Partite
  • Armored
  • Memory Resident
  • Sparse Infector
  • Polymorphic

Each type has distinct characteristics and methods of infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware?

A

Malware that encrypts files and demands payment for decryption

Examples include CryptoLocker and CryptoWall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false: Trojan horses are programs that look benign but can be harmful.

A

TRUE

They can download harmful software, install key loggers, or open back doors for hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the forms of spyware mentioned?

A
  • Key loggers
  • Screen Capture

Spyware can be used legally for monitoring or illegally for covert deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a buffer overflow attack?

A

An attack that exploits a program’s vulnerability by overflowing its buffer

This can lead to unauthorized access or system crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Advanced Persistent Threat (APT)?

A

Advanced techniques used over a significant period of time

APTs are not typically executed by script kiddies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does antivirus software operate?

A
  • Scans for virus signatures
  • Keeps the signature file updated
  • Watches the behavior of executables

This includes monitoring attempts to access the email address book or change Registry settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some examples of malware mentioned?

A
  • WannaCry
  • Petya
  • Shamoon

These are notable examples of viruses that have caused significant damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you do to avoid viruses?

A
  • Use a virus scanner
  • DO NOT open questionable attachments
  • Use a code word for safe attachments from friends
  • Do not believe ‘Security Alerts’

Following these rules can help protect against virus infections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a rootkit?

A

A collection of hacking tools that can monitor traffic and keystrokes

Rootkits can create backdoors and alter log files to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a logic bomb?

A

Malware that goes off on a specific condition

This condition can be a date or other criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define macro virus.

A

A virus that infects documents and uses macros to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: Boot sector viruses infect the operating system’s boot process.

A

TRUE

They are activated when the computer starts up.

17
Q

What is a multipartite virus?

A

A virus that can infect multiple parts of a system, such as files and boot sectors.

18
Q

Fill in the blank: An armored virus is designed to ______ detection.

19
Q

Define memory-resident virus.

A

A virus that embeds itself in the system’s memory, allowing it to execute whenever the computer is running.

20
Q

True or false: Sparse infectors only infect files under certain conditions.

A

TRUE

They selectively infect files to avoid detection.

21
Q

What is a polymorphic virus?

A

A virus that changes its code each time it infects a new file to avoid detection.

22
Q

Fill in the blank: A macro virus primarily targets ______ applications.

23
Q

True or false: Boot sector viruses can spread through removable media.

A

TRUE

They often spread via USB drives.

24
Q

Define sparse infector.

A

A virus that infects files intermittently, reducing the chance of detection.

25
What is the main characteristic of an **armored virus**?
It uses various techniques to protect itself from analysis and removal.
26
Fill in the blank: A **memory-resident virus** can remain active in ______.
RAM
27
True or false: **Polymorphic viruses** are easy to detect due to their changing code.
FALSE ## Footnote Their ability to change makes them harder to identify.
28
What type of virus is known for infecting both files and boot sectors?
A multipartite virus.
29
Fill in the blank: A **macro virus** can be written in ______ language.
macro