Computer Security Chapter 6: Malicious Software

PlushBegonia avatar
PlushBegonia
·
·
Download

Start Quiz

Study Flashcards

26 Questions

What type of attack is also known as a user-interface (UI) redress attack?

Clickjacking

What is the primary purpose of social engineering tactics?

To trick users into compromising their own systems

What is the name of the virus that was first seen in 1998 and deletes data on an infected system by overwriting the hard drive with zeroes?

Chernobyl virus

What is the term for unsolicited bulk e-mail that is often used for phishing attacks and malware distribution?

Spam

What is the name of the first mobile phone Trojan that appeared in 2004?

Skuller

What is the term for a program or utility containing harmful hidden code?

Trojan horse

What is the primary objective of Payload System Corruption (2 of 3) Ransomware?

To encrypt data and demand payment for the decryption key

What is the term for a collection of bots that can act in a coordinated manner?

Botnet

What is the primary goal of Phishing attacks?

To exploit social engineering to leverage the user's trust

What is the term for a secret entry point into a program that allows an attacker to gain access and bypass security access procedures?

Backdoor

What is the primary goal of Rootkit malware?

To hide and maintain covert access to a system

What is the ideal solution to the threat of malware?

Prevention

What is the primary approach of First-generation Anti-Virus Software?

Signature-based scanning

What is the term for malicious code that is set to 'explode' when certain conditions are met?

Logic bomb

What is the primary goal of Perimeter Scanning Approaches?

To detect and block malware

What is the term for software that monitors program behavior in real-time for malicious action?

Host-based behavior-blocking software

What is malware, according to NIST definition?

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system.

What is the primary difference between a virus and a worm?

A virus requires a host program to replicate, while a worm is a self-contained program.

What is the term for a malicious attack that involves a wide variety of intrusion technologies and malware?

Advanced Persistent Threat (APT)

What is the purpose of a trigger event in a virus?

To activate the virus's payload

What is the name of the first known worm infection?

Morris Worm

What is the term for a program that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?

Mobile Code

What is the primary way that malware spreads through shared media?

All of the above

What is the term for a malicious attack that involves compromising websites and then waiting for targeted victims to visit them?

Watering-Hole Attack

What is the term for a type of malware that encrypts files and demands a ransom payment to recover them?

Ransomware

What is the term for a type of malware that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?

Macro Virus

This quiz covers the definition and classification of malware, including how it spreads and propagates to compromise data, applications, and operating systems. Learn about the different types of malware and their impact on computer security.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser