Podcast
Questions and Answers
What is the definition of malware according to NIST 800-83?
What is the definition of malware according to NIST 800-83?
- A type of cybercrime that targets business and political organizations.
- A program that helps to protect a system.
- A set of tools for generating new malware automatically.
- A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system. (correct)
What is an advanced persistent threat?
What is an advanced persistent threat?
- A type of malware that is directed at business and political targets. (correct)
- A type of malware that is designed to steal personal data.
- A type of cybercrime that targets individual users.
- A type of malware that is designed to crash systems.
What is adware?
What is adware?
- A type of malware that is used to crash systems.
- A type of malware that is used to gain unauthorized access to systems.
- A type of malware that is used to steal personal data.
- Advertising that is integrated into software. (correct)
What is a Trojan horse?
What is a Trojan horse?
What is a primary way that new worms penetrate systems?
What is a primary way that new worms penetrate systems?
What is a downloader?
What is a downloader?
What is a drive-by download?
What is a drive-by download?
What technique do worms adopt to evade detection?
What technique do worms adopt to evade detection?
What is a characteristic of metamorphic worms?
What is a characteristic of metamorphic worms?
What is a type of malicious payload that worms can spread?
What is a type of malicious payload that worms can spread?
What is a zero-day exploit?
What is a zero-day exploit?
How many zero-day exploits were discovered in 2015?
How many zero-day exploits were discovered in 2015?
What type of malware is used to capture keystrokes on a compromised system?
What type of malware is used to capture keystrokes on a compromised system?
What is the term for a set of tools used after an attacker gains root-level access to a computer system?
What is the term for a set of tools used after an attacker gains root-level access to a computer system?
What is the purpose of a logic bomb?
What is the purpose of a logic bomb?
What type of malware uses macro or scripting code to replicate itself?
What type of malware uses macro or scripting code to replicate itself?
What is the term for software that collects information from a computer and transmits it to another system?
What is the term for software that collects information from a computer and transmits it to another system?
What is a computer program that appears to have a useful function but has a hidden and potentially malicious function?
What is a computer program that appears to have a useful function but has a hidden and potentially malicious function?
What was the main target of the WannaCry Ransomware attack in May 2017?
What was the main target of the WannaCry Ransomware attack in May 2017?
What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
What is the term for a worm that targets smartphones and can completely disable the phone, delete data on the phone, or force the device to send costly messages?
What is the term for a worm that targets smartphones and can completely disable the phone, delete data on the phone, or force the device to send costly messages?
What is the term for exploiting browser and plugin vulnerabilities to download and install malware on a system without the user’s knowledge or consent?
What is the term for exploiting browser and plugin vulnerabilities to download and install malware on a system without the user’s knowledge or consent?
What is the term for a type of malicious software that captures keystrokes to allow an attacker to monitor sensitive information?
What is the term for a type of malicious software that captures keystrokes to allow an attacker to monitor sensitive information?
What is the term for a secret entry point into a program allowing an attacker to gain access and bypass the security access procedures?
What is the term for a secret entry point into a program allowing an attacker to gain access and bypass the security access procedures?
What is the term for a set of hidden programs installed on a system to maintain covert access to that system?
What is the term for a set of hidden programs installed on a system to maintain covert access to that system?
What is the approach to mitigate malware threats by integrating with the operating system of a host computer and monitoring program behavior in real time for malicious action?
What is the approach to mitigate malware threats by integrating with the operating system of a host computer and monitoring program behavior in real time for malicious action?
What is the term for the ideal solution to the threat of malware?
What is the term for the ideal solution to the threat of malware?
What is the term for a technique used to detect and analyze malware by running potentially malicious code in an emulated sandbox or on a virtual machine?
What is the term for a technique used to detect and analyze malware by running potentially malicious code in an emulated sandbox or on a virtual machine?
What is a type of malware that can run independently and propagate a complete working version of itself onto other hosts on a network?
What is a type of malware that can run independently and propagate a complete working version of itself onto other hosts on a network?
What is the term for malware that does not replicate?
What is the term for malware that does not replicate?
What is the primary mechanism of propagation for viruses?
What is the primary mechanism of propagation for viruses?
What is the term for malware that includes a variety of propagation mechanisms and payload modules?
What is the term for malware that includes a variety of propagation mechanisms and payload modules?
What is the characteristic of Advanced Persistent Threats (APTs) that involves the determined application of a wide variety of intrusion technologies and malware over an extended period?
What is the characteristic of Advanced Persistent Threats (APTs) that involves the determined application of a wide variety of intrusion technologies and malware over an extended period?
What is the term for a virus that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?
What is the term for a virus that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?
What is the term for a worm that spreads through electronic mail or instant messenger facility?
What is the term for a worm that spreads through electronic mail or instant messenger facility?
What is the term for the mechanism by which a virus spreads or propagates?
What is the term for the mechanism by which a virus spreads or propagates?
What is the term for a type of worm that uses information contained on an infected victim machine to find more hosts to scan?
What is the term for a type of worm that uses information contained on an infected victim machine to find more hosts to scan?
What is the term for a type of malware that steals information from the system or keylogs?
What is the term for a type of malware that steals information from the system or keylogs?