Podcast
Questions and Answers
What is the primary goal of malware according to NIST 800-83?
What is the primary goal of malware according to NIST 800-83?
- To provide user-friendly interfaces
- To compromise the confidentiality, integrity, or availability of a system (correct)
- To improve the performance of a system
- To provide additional functionality to a system
What is the term for malicious hacker tools used to break into new machines remotely?
What is the term for malicious hacker tools used to break into new machines remotely?
- Auto-rooter (correct)
- Backdoor
- Downloader
- Attack Kit
What is the purpose of a downloader in malware?
What is the purpose of a downloader in malware?
- To install other items on a machine that is under attack (correct)
- To uninstall malware from a system
- To install malware on a system
- To remove viruses from a system
What type of malware is directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period?
What type of malware is directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period?
What is the term for a mechanism that bypasses a normal security check, allowing unauthorized access to functionality in a program or onto a compromised system?
What is the term for a mechanism that bypasses a normal security check, allowing unauthorized access to functionality in a program or onto a compromised system?
What is an attack that uses code in a compromised web site to exploit a browser vulnerability and attack a client system when the site is viewed?
What is an attack that uses code in a compromised web site to exploit a browser vulnerability and attack a client system when the site is viewed?
What is a common method used by worms to evade detection?
What is a common method used by worms to evade detection?
What is the advantage of using a worm to spread malicious payloads?
What is the advantage of using a worm to spread malicious payloads?
What is a zero-day exploit?
What is a zero-day exploit?
What is the purpose of metamorphic worms' behavior patterns?
What is the purpose of metamorphic worms' behavior patterns?
What was significant about the year 2015 in terms of zero-day exploits?
What was significant about the year 2015 in terms of zero-day exploits?
How do worms typically penetrate systems?
How do worms typically penetrate systems?
What is the primary purpose of a flooders?
What is the primary purpose of a flooders?
What is a typical characteristic of a logic bomb?
What is a typical characteristic of a logic bomb?
What is the primary function of a spyware?
What is the primary function of a spyware?
What is a rootkit typically used for?
What is a rootkit typically used for?
What is the main difference between a macro virus and other types of viruses?
What is the main difference between a macro virus and other types of viruses?
What is a zombie or bot?
What is a zombie or bot?
What is a type of malware that tries to replicate itself into other executable machine or script code?
What is a type of malware that tries to replicate itself into other executable machine or script code?
Which type of malware is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network?
Which type of malware is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network?
What is the primary mechanism by which viruses spread?
What is the primary mechanism by which viruses spread?
What is an example of a payload action performed by malware once it reaches a target system?
What is an example of a payload action performed by malware once it reaches a target system?
What is the term used to describe the development and deployment of malware that requires considerable technical skill by software authors?
What is the term used to describe the development and deployment of malware that requires considerable technical skill by software authors?
Which type of malware is known for its ability to mutate with every infection?
Which type of malware is known for its ability to mutate with every infection?
What is the term used to describe a computer worm that uses network connections to spread from system to system?
What is the term used to describe a computer worm that uses network connections to spread from system to system?
What is the primary mechanism by which worms spread?
What is the primary mechanism by which worms spread?
What is the term used to describe a type of malware that infects documents and uses the macro programming capabilities of the document’s application to execute and propagate?
What is the term used to describe a type of malware that infects documents and uses the macro programming capabilities of the document’s application to execute and propagate?
What is the term used to describe a type of malware that carries some form of payload, such as a virus or Trojan, and uses social engineering tactics to trick users into executing the malware?
What is the term used to describe a type of malware that carries some form of payload, such as a virus or Trojan, and uses social engineering tactics to trick users into executing the malware?
What was the WannaCry Ransomware attack that spread rapidly in May 2017?
What was the WannaCry Ransomware attack that spread rapidly in May 2017?
What is mobile code according to NIST SP 800-28?
What is mobile code according to NIST SP 800-28?
What is the primary goal of a ransomware attack?
What is the primary goal of a ransomware attack?
What is a backdoor?
What is a backdoor?
What is the primary goal of a phishing attack?
What is the primary goal of a phishing attack?
What is a rootkit?
What is a rootkit?
What is the ideal solution to the threat of malware?
What is the ideal solution to the threat of malware?
What is sandbox analysis?
What is sandbox analysis?
What is a drive-by-download?
What is a drive-by-download?
What is the primary goal of a spyware?
What is the primary goal of a spyware?