Malware and Cybercrime

RobustSeattle1717 avatar
RobustSeattle1717
·
·
Download

Start Quiz

Study Flashcards

38 Questions

What is the primary goal of malware according to NIST 800-83?

To compromise the confidentiality, integrity, or availability of a system

What is the term for malicious hacker tools used to break into new machines remotely?

Auto-rooter

What is the purpose of a downloader in malware?

To install other items on a machine that is under attack

What type of malware is directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period?

Advanced persistent threat

What is the term for a mechanism that bypasses a normal security check, allowing unauthorized access to functionality in a program or onto a compromised system?

Backdoor

What is an attack that uses code in a compromised web site to exploit a browser vulnerability and attack a client system when the site is viewed?

Drive-by download

What is a common method used by worms to evade detection?

Polymorphic technique

What is the advantage of using a worm to spread malicious payloads?

They can compromise a large number of systems rapidly

What is a zero-day exploit?

An unknown vulnerability that is only discovered by the general network community when the worm is launched

What is the purpose of metamorphic worms' behavior patterns?

To unleash behavior patterns at different stages of propagation

What was significant about the year 2015 in terms of zero-day exploits?

It was the year when the number of zero-day exploits significantly increased

How do worms typically penetrate systems?

Through exploiting Web servers, browsers, e-mail, and other network-based applications

What is the primary purpose of a flooders?

To generate a large volume of data to attack networked computer systems

What is a typical characteristic of a logic bomb?

It lies dormant until a predefined condition is met

What is the primary function of a spyware?

To collect information from a computer and transmit it to another system

What is a rootkit typically used for?

To set up a hidden backdoor in a computer system

What is the main difference between a macro virus and other types of viruses?

It uses macro or scripting code to replicate itself

What is a zombie or bot?

A computer program that appears to have a useful function but also has a hidden malicious function

What is a type of malware that tries to replicate itself into other executable machine or script code?

Virus

Which type of malware is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network?

Worm

What is the primary mechanism by which viruses spread?

Infection of existing content

What is an example of a payload action performed by malware once it reaches a target system?

All of the above

What is the term used to describe the development and deployment of malware that requires considerable technical skill by software authors?

Virus-creation toolkits

Which type of malware is known for its ability to mutate with every infection?

Metamorphic virus

What is the term used to describe a computer worm that uses network connections to spread from system to system?

Network worm

What is the primary mechanism by which worms spread?

Exploit of software vulnerabilities

What is the term used to describe a type of malware that infects documents and uses the macro programming capabilities of the document’s application to execute and propagate?

Macro virus

What is the term used to describe a type of malware that carries some form of payload, such as a virus or Trojan, and uses social engineering tactics to trick users into executing the malware?

Trojan

What was the WannaCry Ransomware attack that spread rapidly in May 2017?

A worm that aggressively scanned both local and remote networks, attempting to exploit a vulnerability in the SMB file sharing service on unpatched Windows systems

What is mobile code according to NIST SP 800-28?

Programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics

What is the primary goal of a ransomware attack?

To demand a ransom payment in exchange for recovering encrypted files

What is a backdoor?

A program or utility containing harmful hidden code

What is the primary goal of a phishing attack?

To steal sensitive information by masquerading as a trusted source

What is a rootkit?

A set of hidden programs installed on a system to maintain covert access to that system

What is the ideal solution to the threat of malware?

Prevention through policy, awareness, vulnerability mitigation, and threat mitigation

What is sandbox analysis?

Running potentially malicious code in an emulated sandbox or on a virtual machine to test its behavior

What is a drive-by-download?

Exploiting browser and plugin vulnerabilities to download and install malware on a system without the user's knowledge or consent

What is the primary goal of a spyware?

To monitor the compromised machine to allow monitoring of a wide range of activity on the system

This quiz covers malicious software, malware, and cybercrime directed at businesses and political targets, including advanced persistent threats, adware, and Trojan horses.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Malware and Cybercrime
38 questions
Malware Payload Capabilities
40 questions
Use Quizgecko on...
Browser
Browser