26 Questions
What type of attack is also known as a user-interface (UI) redress attack?
Clickjacking
What is the primary purpose of social engineering tactics?
To trick users into compromising their own systems
What is the name of the virus that was first seen in 1998 and deletes data on an infected system by overwriting the hard drive with zeroes?
Chernobyl virus
What is the term for unsolicited bulk e-mail that is often used for phishing attacks and malware distribution?
Spam
What is the name of the first mobile phone Trojan that appeared in 2004?
Skuller
What is the term for a program or utility containing harmful hidden code?
Trojan horse
What is the primary objective of Payload System Corruption (2 of 3) Ransomware?
To encrypt data and demand payment for the decryption key
What is the term for a collection of bots that can act in a coordinated manner?
Botnet
What is the primary goal of Phishing attacks?
To exploit social engineering to leverage the user's trust
What is the term for a secret entry point into a program that allows an attacker to gain access and bypass security access procedures?
Backdoor
What is the primary goal of Rootkit malware?
To hide and maintain covert access to a system
What is the ideal solution to the threat of malware?
Prevention
What is the primary approach of First-generation Anti-Virus Software?
Signature-based scanning
What is the term for malicious code that is set to 'explode' when certain conditions are met?
Logic bomb
What is the primary goal of Perimeter Scanning Approaches?
To detect and block malware
What is the term for software that monitors program behavior in real-time for malicious action?
Host-based behavior-blocking software
What is malware, according to NIST definition?
A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system.
What is the primary difference between a virus and a worm?
A virus requires a host program to replicate, while a worm is a self-contained program.
What is the term for a malicious attack that involves a wide variety of intrusion technologies and malware?
Advanced Persistent Threat (APT)
What is the purpose of a trigger event in a virus?
To activate the virus's payload
What is the name of the first known worm infection?
Morris Worm
What is the term for a program that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
Mobile Code
What is the primary way that malware spreads through shared media?
All of the above
What is the term for a malicious attack that involves compromising websites and then waiting for targeted victims to visit them?
Watering-Hole Attack
What is the term for a type of malware that encrypts files and demands a ransom payment to recover them?
Ransomware
What is the term for a type of malware that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?
Macro Virus
This quiz covers the definition and classification of malware, including how it spreads and propagates to compromise data, applications, and operating systems. Learn about the different types of malware and their impact on computer security.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free