Malicious Software and Cybercrime
38 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the definition of malware according to NIST 800-83?

  • A type of cybercrime that targets business and political organizations.
  • A program that helps to protect a system.
  • A set of tools for generating new malware automatically.
  • A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system. (correct)
  • What is an advanced persistent threat?

  • A type of malware that is directed at business and political targets. (correct)
  • A type of malware that is designed to steal personal data.
  • A type of cybercrime that targets individual users.
  • A type of malware that is designed to crash systems.
  • What is adware?

  • A type of malware that is used to crash systems.
  • A type of malware that is used to gain unauthorized access to systems.
  • A type of malware that is used to steal personal data.
  • Advertising that is integrated into software. (correct)
  • What is a Trojan horse?

    <p>Not Provided in the text.</p> Signup and view all the answers

    What is a primary way that new worms penetrate systems?

    <p>Through network-based applications</p> Signup and view all the answers

    What is a downloader?

    <p>Code that installs other items on a machine that is under attack.</p> Signup and view all the answers

    What is a drive-by download?

    <p>An attack using code in a compromised web site that exploits a browser vulnerability to attack a client system when the site is viewed.</p> Signup and view all the answers

    What technique do worms adopt to evade detection?

    <p>Polymorphic technique</p> Signup and view all the answers

    What is a characteristic of metamorphic worms?

    <p>They have a repertoire of behavior patterns</p> Signup and view all the answers

    What is a type of malicious payload that worms can spread?

    <p>Distributed denial-of-service bots</p> Signup and view all the answers

    What is a zero-day exploit?

    <p>An unknown vulnerability</p> Signup and view all the answers

    How many zero-day exploits were discovered in 2015?

    <p>54</p> Signup and view all the answers

    What type of malware is used to capture keystrokes on a compromised system?

    <p>Keyloggers</p> Signup and view all the answers

    What is the term for a set of tools used after an attacker gains root-level access to a computer system?

    <p>Rootkit</p> Signup and view all the answers

    What is the purpose of a logic bomb?

    <p>To trigger an unauthorized act when a predefined condition is met</p> Signup and view all the answers

    What type of malware uses macro or scripting code to replicate itself?

    <p>Macro virus</p> Signup and view all the answers

    What is the term for software that collects information from a computer and transmits it to another system?

    <p>Spyware</p> Signup and view all the answers

    What is a computer program that appears to have a useful function but has a hidden and potentially malicious function?

    <p>Zombie</p> Signup and view all the answers

    What was the main target of the WannaCry Ransomware attack in May 2017?

    <p>All of the above</p> Signup and view all the answers

    What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?

    <p>Mobile code</p> Signup and view all the answers

    What is the term for a worm that targets smartphones and can completely disable the phone, delete data on the phone, or force the device to send costly messages?

    <p>Mobile Phone Worms</p> Signup and view all the answers

    What is the term for exploiting browser and plugin vulnerabilities to download and install malware on a system without the user’s knowledge or consent?

    <p>Drive-By-Downloads</p> Signup and view all the answers

    What is the term for a type of malicious software that captures keystrokes to allow an attacker to monitor sensitive information?

    <p>Keylogger</p> Signup and view all the answers

    What is the term for a secret entry point into a program allowing an attacker to gain access and bypass the security access procedures?

    <p>Backdoor</p> Signup and view all the answers

    What is the term for a set of hidden programs installed on a system to maintain covert access to that system?

    <p>Rootkit</p> Signup and view all the answers

    What is the approach to mitigate malware threats by integrating with the operating system of a host computer and monitoring program behavior in real time for malicious action?

    <p>Host-Based Behavior-Blocking Software</p> Signup and view all the answers

    What is the term for the ideal solution to the threat of malware?

    <p>Prevention</p> Signup and view all the answers

    What is the term for a technique used to detect and analyze malware by running potentially malicious code in an emulated sandbox or on a virtual machine?

    <p>Sandbox Analysis</p> Signup and view all the answers

    What is a type of malware that can run independently and propagate a complete working version of itself onto other hosts on a network?

    <p>Worm</p> Signup and view all the answers

    What is the term for malware that does not replicate?

    <p>Trojan</p> Signup and view all the answers

    What is the primary mechanism of propagation for viruses?

    <p>Infection of existing content</p> Signup and view all the answers

    What is the term for malware that includes a variety of propagation mechanisms and payload modules?

    <p>Attack kit</p> Signup and view all the answers

    What is the characteristic of Advanced Persistent Threats (APTs) that involves the determined application of a wide variety of intrusion technologies and malware over an extended period?

    <p>Persistent</p> Signup and view all the answers

    What is the term for a virus that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?

    <p>Macro virus</p> Signup and view all the answers

    What is the term for a worm that spreads through electronic mail or instant messenger facility?

    <p>E-mail worm</p> Signup and view all the answers

    What is the term for the mechanism by which a virus spreads or propagates?

    <p>Infection vector</p> Signup and view all the answers

    What is the term for a type of worm that uses information contained on an infected victim machine to find more hosts to scan?

    <p>Topological worm</p> Signup and view all the answers

    What is the term for a type of malware that steals information from the system or keylogs?

    <p>Spyware</p> Signup and view all the answers

    More Like This

    Malware and Cybercrime
    38 questions
    Cyber Crime and Hacking Overview
    48 questions

    Cyber Crime and Hacking Overview

    DedicatedJuxtaposition7699 avatar
    DedicatedJuxtaposition7699
    Use Quizgecko on...
    Browser
    Browser