Malicious Software and Cybercrime

SmarterMookaite avatar
SmarterMookaite
·
·
Download

Start Quiz

Study Flashcards

38 Questions

What is the definition of malware according to NIST 800-83?

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.

What is an advanced persistent threat?

A type of malware that is directed at business and political targets.

What is adware?

Advertising that is integrated into software.

What is a Trojan horse?

Not Provided in the text.

What is a primary way that new worms penetrate systems?

Through network-based applications

What is a downloader?

Code that installs other items on a machine that is under attack.

What is a drive-by download?

An attack using code in a compromised web site that exploits a browser vulnerability to attack a client system when the site is viewed.

What technique do worms adopt to evade detection?

Polymorphic technique

What is a characteristic of metamorphic worms?

They have a repertoire of behavior patterns

What is a type of malicious payload that worms can spread?

Distributed denial-of-service bots

What is a zero-day exploit?

An unknown vulnerability

How many zero-day exploits were discovered in 2015?

54

What type of malware is used to capture keystrokes on a compromised system?

Keyloggers

What is the term for a set of tools used after an attacker gains root-level access to a computer system?

Rootkit

What is the purpose of a logic bomb?

To trigger an unauthorized act when a predefined condition is met

What type of malware uses macro or scripting code to replicate itself?

Macro virus

What is the term for software that collects information from a computer and transmits it to another system?

Spyware

What is a computer program that appears to have a useful function but has a hidden and potentially malicious function?

Zombie

What was the main target of the WannaCry Ransomware attack in May 2017?

All of the above

What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?

Mobile code

What is the term for a worm that targets smartphones and can completely disable the phone, delete data on the phone, or force the device to send costly messages?

Mobile Phone Worms

What is the term for exploiting browser and plugin vulnerabilities to download and install malware on a system without the user’s knowledge or consent?

Drive-By-Downloads

What is the term for a type of malicious software that captures keystrokes to allow an attacker to monitor sensitive information?

Keylogger

What is the term for a secret entry point into a program allowing an attacker to gain access and bypass the security access procedures?

Backdoor

What is the term for a set of hidden programs installed on a system to maintain covert access to that system?

Rootkit

What is the approach to mitigate malware threats by integrating with the operating system of a host computer and monitoring program behavior in real time for malicious action?

Host-Based Behavior-Blocking Software

What is the term for the ideal solution to the threat of malware?

Prevention

What is the term for a technique used to detect and analyze malware by running potentially malicious code in an emulated sandbox or on a virtual machine?

Sandbox Analysis

What is a type of malware that can run independently and propagate a complete working version of itself onto other hosts on a network?

Worm

What is the term for malware that does not replicate?

Trojan

What is the primary mechanism of propagation for viruses?

Infection of existing content

What is the term for malware that includes a variety of propagation mechanisms and payload modules?

Attack kit

What is the characteristic of Advanced Persistent Threats (APTs) that involves the determined application of a wide variety of intrusion technologies and malware over an extended period?

Persistent

What is the term for a virus that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?

Macro virus

What is the term for a worm that spreads through electronic mail or instant messenger facility?

E-mail worm

What is the term for the mechanism by which a virus spreads or propagates?

Infection vector

What is the term for a type of worm that uses information contained on an infected victim machine to find more hosts to scan?

Topological worm

What is the term for a type of malware that steals information from the system or keylogs?

Spyware

This quiz covers malicious software, malware, and cybercrime, including advanced persistent threats, adware, and Trojan horses, as defined by NIST 800-83.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Tema 0 y 1 Isidro
43 questions

Tema 0 y 1 Isidro

AffirmativePlum avatar
AffirmativePlum
Cybercrime and Malware
12 questions
Use Quizgecko on...
Browser
Browser