Malware Evasion Techniques Quiz

HottestNourishment avatar
HottestNourishment
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is a Backdoor and how can it be used by attackers?

A Backdoor gives access to a computer, program, or service that circumvents normal security protections. A backdoor installed on a computer allows the attacker to return later and bypass security settings. Some software developers create a legitimate backdoor to be removed when the app is finalized. If forgotten, attackers can use it to access illegally.

What is a Logic Bomb and how is it triggered?

A Logic Bomb is computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific event triggers it. It then performs its malicious activity (e.g., delete files). It could be implanted by a mad employee.

What is a Rootkit and how does it hide on a computer?

A Rootkit can hide its presence and the presence of other malware on the computer. It does this by accessing 'lower layers' of the OS to make alterations.

More Quizzes Like This

Use Quizgecko on...
Browser
Browser