Podcast
Questions and Answers
What is the definition of malware according to NIST 800-83?
What is the definition of malware according to NIST 800-83?
What is an advanced persistent threat?
What is an advanced persistent threat?
What is adware?
What is adware?
What is a Trojan horse?
What is a Trojan horse?
Signup and view all the answers
What is a primary way that new worms penetrate systems?
What is a primary way that new worms penetrate systems?
Signup and view all the answers
What is a downloader?
What is a downloader?
Signup and view all the answers
What is a drive-by download?
What is a drive-by download?
Signup and view all the answers
What technique do worms adopt to evade detection?
What technique do worms adopt to evade detection?
Signup and view all the answers
What is a characteristic of metamorphic worms?
What is a characteristic of metamorphic worms?
Signup and view all the answers
What is a type of malicious payload that worms can spread?
What is a type of malicious payload that worms can spread?
Signup and view all the answers
What is a zero-day exploit?
What is a zero-day exploit?
Signup and view all the answers
How many zero-day exploits were discovered in 2015?
How many zero-day exploits were discovered in 2015?
Signup and view all the answers
What type of malware is used to capture keystrokes on a compromised system?
What type of malware is used to capture keystrokes on a compromised system?
Signup and view all the answers
What is the term for a set of tools used after an attacker gains root-level access to a computer system?
What is the term for a set of tools used after an attacker gains root-level access to a computer system?
Signup and view all the answers
What is the purpose of a logic bomb?
What is the purpose of a logic bomb?
Signup and view all the answers
What type of malware uses macro or scripting code to replicate itself?
What type of malware uses macro or scripting code to replicate itself?
Signup and view all the answers
What is the term for software that collects information from a computer and transmits it to another system?
What is the term for software that collects information from a computer and transmits it to another system?
Signup and view all the answers
What is a computer program that appears to have a useful function but has a hidden and potentially malicious function?
What is a computer program that appears to have a useful function but has a hidden and potentially malicious function?
Signup and view all the answers
What was the main target of the WannaCry Ransomware attack in May 2017?
What was the main target of the WannaCry Ransomware attack in May 2017?
Signup and view all the answers
What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
Signup and view all the answers
What is the term for a worm that targets smartphones and can completely disable the phone, delete data on the phone, or force the device to send costly messages?
What is the term for a worm that targets smartphones and can completely disable the phone, delete data on the phone, or force the device to send costly messages?
Signup and view all the answers
What is the term for exploiting browser and plugin vulnerabilities to download and install malware on a system without the user’s knowledge or consent?
What is the term for exploiting browser and plugin vulnerabilities to download and install malware on a system without the user’s knowledge or consent?
Signup and view all the answers
What is the term for a type of malicious software that captures keystrokes to allow an attacker to monitor sensitive information?
What is the term for a type of malicious software that captures keystrokes to allow an attacker to monitor sensitive information?
Signup and view all the answers
What is the term for a secret entry point into a program allowing an attacker to gain access and bypass the security access procedures?
What is the term for a secret entry point into a program allowing an attacker to gain access and bypass the security access procedures?
Signup and view all the answers
What is the term for a set of hidden programs installed on a system to maintain covert access to that system?
What is the term for a set of hidden programs installed on a system to maintain covert access to that system?
Signup and view all the answers
What is the approach to mitigate malware threats by integrating with the operating system of a host computer and monitoring program behavior in real time for malicious action?
What is the approach to mitigate malware threats by integrating with the operating system of a host computer and monitoring program behavior in real time for malicious action?
Signup and view all the answers
What is the term for the ideal solution to the threat of malware?
What is the term for the ideal solution to the threat of malware?
Signup and view all the answers
What is the term for a technique used to detect and analyze malware by running potentially malicious code in an emulated sandbox or on a virtual machine?
What is the term for a technique used to detect and analyze malware by running potentially malicious code in an emulated sandbox or on a virtual machine?
Signup and view all the answers
What is a type of malware that can run independently and propagate a complete working version of itself onto other hosts on a network?
What is a type of malware that can run independently and propagate a complete working version of itself onto other hosts on a network?
Signup and view all the answers
What is the term for malware that does not replicate?
What is the term for malware that does not replicate?
Signup and view all the answers
What is the primary mechanism of propagation for viruses?
What is the primary mechanism of propagation for viruses?
Signup and view all the answers
What is the term for malware that includes a variety of propagation mechanisms and payload modules?
What is the term for malware that includes a variety of propagation mechanisms and payload modules?
Signup and view all the answers
What is the characteristic of Advanced Persistent Threats (APTs) that involves the determined application of a wide variety of intrusion technologies and malware over an extended period?
What is the characteristic of Advanced Persistent Threats (APTs) that involves the determined application of a wide variety of intrusion technologies and malware over an extended period?
Signup and view all the answers
What is the term for a virus that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?
What is the term for a virus that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?
Signup and view all the answers
What is the term for a worm that spreads through electronic mail or instant messenger facility?
What is the term for a worm that spreads through electronic mail or instant messenger facility?
Signup and view all the answers
What is the term for the mechanism by which a virus spreads or propagates?
What is the term for the mechanism by which a virus spreads or propagates?
Signup and view all the answers
What is the term for a type of worm that uses information contained on an infected victim machine to find more hosts to scan?
What is the term for a type of worm that uses information contained on an infected victim machine to find more hosts to scan?
Signup and view all the answers
What is the term for a type of malware that steals information from the system or keylogs?
What is the term for a type of malware that steals information from the system or keylogs?
Signup and view all the answers