Malware Evasion Techniques Quiz
3 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a Backdoor and how can it be used by attackers?

A Backdoor gives access to a computer, program, or service that circumvents normal security protections. A backdoor installed on a computer allows the attacker to return later and bypass security settings. Some software developers create a legitimate backdoor to be removed when the app is finalized. If forgotten, attackers can use it to access illegally.

What is a Logic Bomb and how is it triggered?

A Logic Bomb is computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific event triggers it. It then performs its malicious activity (e.g., delete files). It could be implanted by a mad employee.

What is a Rootkit and how does it hide on a computer?

A Rootkit can hide its presence and the presence of other malware on the computer. It does this by accessing 'lower layers' of the OS to make alterations.

More Like This

Use Quizgecko on...
Browser
Browser