MALWARE Flashcards

(27 cards)

1
Q

Malicious code that runs on a machine without the user’s knowledge, and this allows the code to infect the computer whenever it is run

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tries to find executables or application file to infect with their malicious code

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A combination of a boot sector type virus and a program virus

A

Multipartite Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Designed to hide itself from being detected by encrypting its malicious code or payload to avoid detection by any antivirus software

A

Encrypted Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced version of an encrypted virus, but instead of just encrypting the contents, it will actually change the virus’s code each time it is executed by altering the decryption module in order for it to evade dectection

A

Polymorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Able to write itself entirely before it attempts to infect a given file

A

Metamorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Not necessarily a specific type of virus, as much as it is a technique used to prevent the virus from being detected by the anti-virus software

A

Stealth virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Have a layer of protection to confuse a program or a person who’s trying to analyze it.

A

Armored Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A form of technical social engineering that attempts to scare end users into taking undersirable action or their system

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Piece of malicious software, much like virus, but it can replicate itself without any user interaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A piece of malicious software that is disguised as a piece of harmless or desirable software

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type of Trojan that is widely used by modern attackers because it provides the attacker with remote control of a victim machine

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of malicious software that is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker

A

Ransomeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network of compromised computers or devices controlled remotely by malicious actors

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Responsible for managing and coordinating the activities of other nodes or devices within a network

A

Command and control Node

17
Q

Type of software that is designed to gain administrative-level control over a given computer system without being detected

18
Q

Allows a system to control access to things like device drivers, sound card, and monitor

19
Q

Technique used to run arbitrary code within the address space of another process by forcing it to load a dynamic-link library

A

DLL Injection

20
Q

Used to bypass the normal security and authentication functions

21
Q

Placed by threat actor on the computer to help maintain persistent access to that system

22
Q

Malicious code that’s inserted into a program, and will only executed when certain conditions have been met.

23
Q

Piece of software where or software that records every single keystroke that is made on computer or mobile device

24
Q

Type of malicious software that is designed to gether and send information about a user or organization

25
Any software that comes pre-installed on a new computer or smartphone
Bloated ware
26
Describes the specific method by which malware code injects a target host
Exploit Technique
27
Used to help the threat actor prolong unauthorized access to a system by hiding tracks, erasing log files, and hiding any evidence of malicious activities
Concealment