Malware Flashcards

(19 cards)

1
Q

What is malware?

A

Malicious software designed to infiltrate computer systems and potentially damage them without user consent

Malware includes various types such as viruses, worms, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the categories of malware.

A
  • Viruses
  • Worms
  • Trojans
  • Ransomware
  • Spyware
  • Rootkits
  • Spam

Each category has distinct characteristics and methods of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between Threat Vector and Attack Vector?

A
  • Threat Vector: Method used to infiltrate a victim’s machine
  • Attack Vector: Means by which the attacker gains access and infects the system

Attack vectors combine both the infiltration method and the infection process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the types of malware attacks?

A
  • Viruses
  • Worms
  • Trojans
  • Ransomware
  • Zombies and Botnets
  • Rootkits
  • Backdoors and Logic Bombs
  • Keyloggers
  • Spyware and Bloatware

Each type has unique methods and impacts on systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some indications of a malware attack?

A
  • Account lockouts
  • Concurrent session utilization
  • Blocked content
  • Impossible travel
  • Resource consumption
  • Inaccessibility
  • Out-of-cycle logging
  • Missing logs
  • Documented attacks

Recognizing these signs can help in early detection of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a computer virus?

A

Made up of malicious code that’s run on a machine without the user’s knowledge

This allows the code to infect the computer whenever it has been run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 10 different types of viruses.

A
  • Boot Sector
  • Macro
  • Program
  • Multipartite
  • Encrypted
  • Polymorphic
  • Metamorphic
  • Stealth
  • Armored
  • Hoax

Each type has specific characteristics and methods of infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a worm?

A

Piece of malicious software that can replicate itself without any user interaction

Worms can spread throughout a network without user consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Trojan?

A

Malicious software disguised as harmless software

Trojans often claim to perform a needed function while granting unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ransomware?

A

Malicious software designed to block access to a computer system or its data by encrypting it until a ransom is paid

Regular backups and security awareness training can help protect against ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a botnet?

A

Network of compromised computers or devices controlled remotely by malicious actors

Botnets are often used for illegal activities, including DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a rootkit?

A

Designed to gain administrative level control over a computer system without being detected

Rootkits can hide their presence and activities, making them difficult to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a backdoor?

A

Originally placed in computer programs to bypass normal security and authentication functions

Backdoors can be used by threat actors to maintain persistent access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a keylogger?

A

Records every single keystroke made on a computer or mobile device

Keyloggers can be software-based or hardware-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spyware?

A

Malicious software designed to gather and send information about a user or organization without their knowledge

Spyware can be installed through various methods, including bundled software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is bloatware?

A

Software that comes pre-installed on a new computer or smartphone that the user did not specifically request

Bloatware can waste storage space and slow down device performance.

17
Q

What is a malware exploitation technique?

A

Specific method by which malware code penetrates and infects a targeted system

Modern malware often uses fileless techniques to avoid detection.

18
Q

What is a Stage 1 Dropper or Downloader?

A

Piece of malware created as a lightweight shellcode that can be executed on a given system

Its primary function is to retrieve additional portions of malware code.

19
Q

What are the 9 common indicators of malware attacks?

A
  • Account Lockouts
  • Concurrent Session Utilization
  • Blocked Content
  • Impossible Travel
  • Resource Consumption
  • Resource Inaccessibility
  • Out-of-Cycle Logging
  • Missing Logs
  • Published or Documented Attacks

Monitoring these indicators can help in identifying potential malware infections.