Malware and Cybercrime

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary goal of malware according to NIST 800-83?

  • To provide user-friendly interfaces
  • To compromise the confidentiality, integrity, or availability of a system (correct)
  • To improve the performance of a system
  • To provide additional functionality to a system

What is the term for malicious hacker tools used to break into new machines remotely?

  • Auto-rooter (correct)
  • Backdoor
  • Downloader
  • Attack Kit

What is the purpose of a downloader in malware?

  • To install other items on a machine that is under attack (correct)
  • To uninstall malware from a system
  • To install malware on a system
  • To remove viruses from a system

What type of malware is directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period?

<p>Advanced persistent threat (C)</p> Signup and view all the answers

What is the term for a mechanism that bypasses a normal security check, allowing unauthorized access to functionality in a program or onto a compromised system?

<p>Backdoor (C)</p> Signup and view all the answers

What is an attack that uses code in a compromised web site to exploit a browser vulnerability and attack a client system when the site is viewed?

<p>Drive-by download (A)</p> Signup and view all the answers

What is a common method used by worms to evade detection?

<p>Polymorphic technique (D)</p> Signup and view all the answers

What is the advantage of using a worm to spread malicious payloads?

<p>They can compromise a large number of systems rapidly (B)</p> Signup and view all the answers

What is a zero-day exploit?

<p>An unknown vulnerability that is only discovered by the general network community when the worm is launched (D)</p> Signup and view all the answers

What is the purpose of metamorphic worms' behavior patterns?

<p>To unleash behavior patterns at different stages of propagation (A)</p> Signup and view all the answers

What was significant about the year 2015 in terms of zero-day exploits?

<p>It was the year when the number of zero-day exploits significantly increased (D)</p> Signup and view all the answers

How do worms typically penetrate systems?

<p>Through exploiting Web servers, browsers, e-mail, and other network-based applications (A)</p> Signup and view all the answers

What is the primary purpose of a flooders?

<p>To generate a large volume of data to attack networked computer systems (D)</p> Signup and view all the answers

What is a typical characteristic of a logic bomb?

<p>It lies dormant until a predefined condition is met (A)</p> Signup and view all the answers

What is the primary function of a spyware?

<p>To collect information from a computer and transmit it to another system (A)</p> Signup and view all the answers

What is a rootkit typically used for?

<p>To set up a hidden backdoor in a computer system (A)</p> Signup and view all the answers

What is the main difference between a macro virus and other types of viruses?

<p>It uses macro or scripting code to replicate itself (B)</p> Signup and view all the answers

What is a zombie or bot?

<p>A computer program that appears to have a useful function but also has a hidden malicious function (B)</p> Signup and view all the answers

What is a type of malware that tries to replicate itself into other executable machine or script code?

<p>Virus (A)</p> Signup and view all the answers

Which type of malware is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network?

<p>Worm (D)</p> Signup and view all the answers

What is the primary mechanism by which viruses spread?

<p>Infection of existing content (D)</p> Signup and view all the answers

What is an example of a payload action performed by malware once it reaches a target system?

<p>All of the above (D)</p> Signup and view all the answers

What is the term used to describe the development and deployment of malware that requires considerable technical skill by software authors?

<p>Virus-creation toolkits (D)</p> Signup and view all the answers

Which type of malware is known for its ability to mutate with every infection?

<p>Metamorphic virus (A)</p> Signup and view all the answers

What is the term used to describe a computer worm that uses network connections to spread from system to system?

<p>Network worm (C)</p> Signup and view all the answers

What is the primary mechanism by which worms spread?

<p>Exploit of software vulnerabilities (D)</p> Signup and view all the answers

What is the term used to describe a type of malware that infects documents and uses the macro programming capabilities of the document’s application to execute and propagate?

<p>Macro virus (C)</p> Signup and view all the answers

What is the term used to describe a type of malware that carries some form of payload, such as a virus or Trojan, and uses social engineering tactics to trick users into executing the malware?

<p>Trojan (D)</p> Signup and view all the answers

What was the WannaCry Ransomware attack that spread rapidly in May 2017?

<p>A worm that aggressively scanned both local and remote networks, attempting to exploit a vulnerability in the SMB file sharing service on unpatched Windows systems (D)</p> Signup and view all the answers

What is mobile code according to NIST SP 800-28?

<p>Programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics (A)</p> Signup and view all the answers

What is the primary goal of a ransomware attack?

<p>To demand a ransom payment in exchange for recovering encrypted files (B)</p> Signup and view all the answers

What is a backdoor?

<p>A program or utility containing harmful hidden code (B)</p> Signup and view all the answers

What is the primary goal of a phishing attack?

<p>To steal sensitive information by masquerading as a trusted source (B)</p> Signup and view all the answers

What is a rootkit?

<p>A set of hidden programs installed on a system to maintain covert access to that system (C)</p> Signup and view all the answers

What is the ideal solution to the threat of malware?

<p>Prevention through policy, awareness, vulnerability mitigation, and threat mitigation (B)</p> Signup and view all the answers

What is sandbox analysis?

<p>Running potentially malicious code in an emulated sandbox or on a virtual machine to test its behavior (B)</p> Signup and view all the answers

What is a drive-by-download?

<p>Exploiting browser and plugin vulnerabilities to download and install malware on a system without the user's knowledge or consent (C)</p> Signup and view all the answers

What is the primary goal of a spyware?

<p>To monitor the compromised machine to allow monitoring of a wide range of activity on the system (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Types of Malware Quiz
9 questions

Types of Malware Quiz

WorthEmpowerment1870 avatar
WorthEmpowerment1870
Hardware Vulnerabilities & Malware
43 questions
Cybersecurity: Viruses and Malware
15 questions

Cybersecurity: Viruses and Malware

DignifiedEiffelTower9877 avatar
DignifiedEiffelTower9877
Use Quizgecko on...
Browser
Browser