Podcast
Questions and Answers
What is the primary goal of malware according to NIST 800-83?
What is the primary goal of malware according to NIST 800-83?
What is the term for malicious hacker tools used to break into new machines remotely?
What is the term for malicious hacker tools used to break into new machines remotely?
What is the purpose of a downloader in malware?
What is the purpose of a downloader in malware?
What type of malware is directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period?
What type of malware is directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period?
Signup and view all the answers
What is the term for a mechanism that bypasses a normal security check, allowing unauthorized access to functionality in a program or onto a compromised system?
What is the term for a mechanism that bypasses a normal security check, allowing unauthorized access to functionality in a program or onto a compromised system?
Signup and view all the answers
What is an attack that uses code in a compromised web site to exploit a browser vulnerability and attack a client system when the site is viewed?
What is an attack that uses code in a compromised web site to exploit a browser vulnerability and attack a client system when the site is viewed?
Signup and view all the answers
What is a common method used by worms to evade detection?
What is a common method used by worms to evade detection?
Signup and view all the answers
What is the advantage of using a worm to spread malicious payloads?
What is the advantage of using a worm to spread malicious payloads?
Signup and view all the answers
What is a zero-day exploit?
What is a zero-day exploit?
Signup and view all the answers
What is the purpose of metamorphic worms' behavior patterns?
What is the purpose of metamorphic worms' behavior patterns?
Signup and view all the answers
What was significant about the year 2015 in terms of zero-day exploits?
What was significant about the year 2015 in terms of zero-day exploits?
Signup and view all the answers
How do worms typically penetrate systems?
How do worms typically penetrate systems?
Signup and view all the answers
What is the primary purpose of a flooders?
What is the primary purpose of a flooders?
Signup and view all the answers
What is a typical characteristic of a logic bomb?
What is a typical characteristic of a logic bomb?
Signup and view all the answers
What is the primary function of a spyware?
What is the primary function of a spyware?
Signup and view all the answers
What is a rootkit typically used for?
What is a rootkit typically used for?
Signup and view all the answers
What is the main difference between a macro virus and other types of viruses?
What is the main difference between a macro virus and other types of viruses?
Signup and view all the answers
What is a zombie or bot?
What is a zombie or bot?
Signup and view all the answers
What is a type of malware that tries to replicate itself into other executable machine or script code?
What is a type of malware that tries to replicate itself into other executable machine or script code?
Signup and view all the answers
Which type of malware is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network?
Which type of malware is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network?
Signup and view all the answers
What is the primary mechanism by which viruses spread?
What is the primary mechanism by which viruses spread?
Signup and view all the answers
What is an example of a payload action performed by malware once it reaches a target system?
What is an example of a payload action performed by malware once it reaches a target system?
Signup and view all the answers
What is the term used to describe the development and deployment of malware that requires considerable technical skill by software authors?
What is the term used to describe the development and deployment of malware that requires considerable technical skill by software authors?
Signup and view all the answers
Which type of malware is known for its ability to mutate with every infection?
Which type of malware is known for its ability to mutate with every infection?
Signup and view all the answers
What is the term used to describe a computer worm that uses network connections to spread from system to system?
What is the term used to describe a computer worm that uses network connections to spread from system to system?
Signup and view all the answers
What is the primary mechanism by which worms spread?
What is the primary mechanism by which worms spread?
Signup and view all the answers
What is the term used to describe a type of malware that infects documents and uses the macro programming capabilities of the document’s application to execute and propagate?
What is the term used to describe a type of malware that infects documents and uses the macro programming capabilities of the document’s application to execute and propagate?
Signup and view all the answers
What is the term used to describe a type of malware that carries some form of payload, such as a virus or Trojan, and uses social engineering tactics to trick users into executing the malware?
What is the term used to describe a type of malware that carries some form of payload, such as a virus or Trojan, and uses social engineering tactics to trick users into executing the malware?
Signup and view all the answers
What was the WannaCry Ransomware attack that spread rapidly in May 2017?
What was the WannaCry Ransomware attack that spread rapidly in May 2017?
Signup and view all the answers
What is mobile code according to NIST SP 800-28?
What is mobile code according to NIST SP 800-28?
Signup and view all the answers
What is the primary goal of a ransomware attack?
What is the primary goal of a ransomware attack?
Signup and view all the answers
What is a backdoor?
What is a backdoor?
Signup and view all the answers
What is the primary goal of a phishing attack?
What is the primary goal of a phishing attack?
Signup and view all the answers
What is a rootkit?
What is a rootkit?
Signup and view all the answers
What is the ideal solution to the threat of malware?
What is the ideal solution to the threat of malware?
Signup and view all the answers
What is sandbox analysis?
What is sandbox analysis?
Signup and view all the answers
What is a drive-by-download?
What is a drive-by-download?
Signup and view all the answers
What is the primary goal of a spyware?
What is the primary goal of a spyware?
Signup and view all the answers