Malware and Cybercrime
38 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of malware according to NIST 800-83?

  • To provide user-friendly interfaces
  • To compromise the confidentiality, integrity, or availability of a system (correct)
  • To improve the performance of a system
  • To provide additional functionality to a system
  • What is the term for malicious hacker tools used to break into new machines remotely?

  • Auto-rooter (correct)
  • Backdoor
  • Downloader
  • Attack Kit
  • What is the purpose of a downloader in malware?

  • To install other items on a machine that is under attack (correct)
  • To uninstall malware from a system
  • To install malware on a system
  • To remove viruses from a system
  • What type of malware is directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period?

    <p>Advanced persistent threat</p> Signup and view all the answers

    What is the term for a mechanism that bypasses a normal security check, allowing unauthorized access to functionality in a program or onto a compromised system?

    <p>Backdoor</p> Signup and view all the answers

    What is an attack that uses code in a compromised web site to exploit a browser vulnerability and attack a client system when the site is viewed?

    <p>Drive-by download</p> Signup and view all the answers

    What is a common method used by worms to evade detection?

    <p>Polymorphic technique</p> Signup and view all the answers

    What is the advantage of using a worm to spread malicious payloads?

    <p>They can compromise a large number of systems rapidly</p> Signup and view all the answers

    What is a zero-day exploit?

    <p>An unknown vulnerability that is only discovered by the general network community when the worm is launched</p> Signup and view all the answers

    What is the purpose of metamorphic worms' behavior patterns?

    <p>To unleash behavior patterns at different stages of propagation</p> Signup and view all the answers

    What was significant about the year 2015 in terms of zero-day exploits?

    <p>It was the year when the number of zero-day exploits significantly increased</p> Signup and view all the answers

    How do worms typically penetrate systems?

    <p>Through exploiting Web servers, browsers, e-mail, and other network-based applications</p> Signup and view all the answers

    What is the primary purpose of a flooders?

    <p>To generate a large volume of data to attack networked computer systems</p> Signup and view all the answers

    What is a typical characteristic of a logic bomb?

    <p>It lies dormant until a predefined condition is met</p> Signup and view all the answers

    What is the primary function of a spyware?

    <p>To collect information from a computer and transmit it to another system</p> Signup and view all the answers

    What is a rootkit typically used for?

    <p>To set up a hidden backdoor in a computer system</p> Signup and view all the answers

    What is the main difference between a macro virus and other types of viruses?

    <p>It uses macro or scripting code to replicate itself</p> Signup and view all the answers

    What is a zombie or bot?

    <p>A computer program that appears to have a useful function but also has a hidden malicious function</p> Signup and view all the answers

    What is a type of malware that tries to replicate itself into other executable machine or script code?

    <p>Virus</p> Signup and view all the answers

    Which type of malware is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network?

    <p>Worm</p> Signup and view all the answers

    What is the primary mechanism by which viruses spread?

    <p>Infection of existing content</p> Signup and view all the answers

    What is an example of a payload action performed by malware once it reaches a target system?

    <p>All of the above</p> Signup and view all the answers

    What is the term used to describe the development and deployment of malware that requires considerable technical skill by software authors?

    <p>Virus-creation toolkits</p> Signup and view all the answers

    Which type of malware is known for its ability to mutate with every infection?

    <p>Metamorphic virus</p> Signup and view all the answers

    What is the term used to describe a computer worm that uses network connections to spread from system to system?

    <p>Network worm</p> Signup and view all the answers

    What is the primary mechanism by which worms spread?

    <p>Exploit of software vulnerabilities</p> Signup and view all the answers

    What is the term used to describe a type of malware that infects documents and uses the macro programming capabilities of the document’s application to execute and propagate?

    <p>Macro virus</p> Signup and view all the answers

    What is the term used to describe a type of malware that carries some form of payload, such as a virus or Trojan, and uses social engineering tactics to trick users into executing the malware?

    <p>Trojan</p> Signup and view all the answers

    What was the WannaCry Ransomware attack that spread rapidly in May 2017?

    <p>A worm that aggressively scanned both local and remote networks, attempting to exploit a vulnerability in the SMB file sharing service on unpatched Windows systems</p> Signup and view all the answers

    What is mobile code according to NIST SP 800-28?

    <p>Programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics</p> Signup and view all the answers

    What is the primary goal of a ransomware attack?

    <p>To demand a ransom payment in exchange for recovering encrypted files</p> Signup and view all the answers

    What is a backdoor?

    <p>A program or utility containing harmful hidden code</p> Signup and view all the answers

    What is the primary goal of a phishing attack?

    <p>To steal sensitive information by masquerading as a trusted source</p> Signup and view all the answers

    What is a rootkit?

    <p>A set of hidden programs installed on a system to maintain covert access to that system</p> Signup and view all the answers

    What is the ideal solution to the threat of malware?

    <p>Prevention through policy, awareness, vulnerability mitigation, and threat mitigation</p> Signup and view all the answers

    What is sandbox analysis?

    <p>Running potentially malicious code in an emulated sandbox or on a virtual machine to test its behavior</p> Signup and view all the answers

    What is a drive-by-download?

    <p>Exploiting browser and plugin vulnerabilities to download and install malware on a system without the user's knowledge or consent</p> Signup and view all the answers

    What is the primary goal of a spyware?

    <p>To monitor the compromised machine to allow monitoring of a wide range of activity on the system</p> Signup and view all the answers

    More Like This

    Malware Payload Capabilities
    40 questions
    Types of Malware Quiz
    9 questions

    Types of Malware Quiz

    WorthEmpowerment1870 avatar
    WorthEmpowerment1870
    1212 Ch9.7-10.2: Malware Types Quiz
    25 questions
    Use Quizgecko on...
    Browser
    Browser