Review Questions - SYS701 - 3 - Malicious Code
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Ryan wants to prevent logic bombs created by insider threats from impacting his organization. What technique will most effectively limit the likelihood of logic bombs being put in place?

  • Deploying endpoint detection and response (EDR) software
  • Disabling autorun for USB drives
  • Deploying antivirus software
  • Using a code review process (correct)

Yasmine believes that her organization may be dealing with an advanced rootkit and wants to write IoC definitions for it. Which of the following is not likely to be a useful IoC for a rootkit?

  • Pop-ups demanding a ransom (correct)
  • Behavior-based identifiers
  • File hashes
  • Command and control domains

Nathan works at a school and notices that one of his staff appears to have logged in and changed grades for a single student to higher grades, even in classes that staff member is not responsible for. When asked, the staff member says that they did not perform the action. Which of the following is the most likely way that a student could have gotten access to the staff member's password?

  • A keylogger (correct)
  • A rootkit
  • Spyware
  • A logic bomb

Amanda notices traffic between her systems and a known malicious host on TCP port 6667. What type of traffic is she most likely detecting?

<p>Command and control (A)</p> Signup and view all the answers

Mike discovers that attackers have left software that allows them to have remote access to systems on a computer in his company's network. How should he describe or classify this malware?

<p>A backdoor (D)</p> Signup and view all the answers

What is the primary impact of bloatware?

<p>Consuming resources (A)</p> Signup and view all the answers

What type of malware is used to gather information about a user's browsing habits and system?

<p>Spyware (C)</p> Signup and view all the answers

Matt uploads a malware sample to a third-party malware scanning site that uses multiple antimalware and antivirus engines to scan the sample. He receives multiple different answers for what the malware package is. What has occurred?

<p>Different vendors use different names for malware packages. (D)</p> Signup and view all the answers

Nancy is concerned that there is a software keylogger on the system she's investigating. What best describes data that may have been stolen?

<p>Keyboard and other input from the user (D)</p> Signup and view all the answers

A system in Elaine's company has suddenly displayed a message demanding payment in Bitcoin and claiming that the data from the system has been encrypted. What type of malware has Elaine likely encountered?

<p>Ransomware (C)</p> Signup and view all the answers

Rick believes that a system he is responsible for has been compromised with malware that uses a rootkit to obtain and retain access to the system. When he runs an antimalware tool's scanner, the system doesn't show any malware. If he has other data that indicates the system is infected, what should his next step be if he wants to determine what malware may be on the system?

<p>Mount the drive on another system and scan it that way. (B)</p> Signup and view all the answers

A recently terminated developer from Jaya's organization has contacted the organization claiming that they left code in an application that they wrote that will delete files and bring the application down if they are not employed by the company. What type of malware is this?

<p>A logic bomb (C)</p> Signup and view all the answers

Selah wants to ensure that malware is completely removed from a system. What should she do to ensure this?

<p>Wipe the drive and reinstall from known good media. (B)</p> Signup and view all the answers

What is the key difference between a worm and a virus?

<p>How they spread (B)</p> Signup and view all the answers

Ben wants to analyze Python code that he believes may be malicious code written by an employee of his organization. What can he do to determine if the code is malicious?

<p>Open the file using a text editor to review the code (D)</p> Signup and view all the answers

Which of the following defenses is most likely to prevent Trojan installation?

<p>Preventing downloads from application stores (B)</p> Signup and view all the answers

Jason's security team reports that a recent WordPress vulnerability seems to have been exploited by malware and that their organization's entire WordPress service cluster has been infected. What type of malware is most likely involved if a vulnerability in the software was exploited over the network?

<p>A worm (C)</p> Signup and view all the answers

Hui's organization recently purchased new Windows computers from an office supply store. The systems have a number of unwanted programs on them that load at startup that were installed by the manufacturer. What type of software is this?

<p>Bloatware (D)</p> Signup and view all the answers

What type of malware connects to a command and control system, allowing attackers to manage, control, and update it remotely?

<p>A bot (A)</p> Signup and view all the answers

Randy believes that a system that he is responsible for was infected after a user picked up a USB drive and plugged it in. The user claims that they only opened one file on the drive to see who might own it. What type of malware is most likely involved?

<p>A virus (A)</p> Signup and view all the answers

Flashcards

Code Review

Process to review code can minimize logic bomb threats.

Rootkit IoC

Pop-ups demanding a ransom aren't usually hidden like rootkits.

Keylogger

Gaining access to the staff member's password by logging their keys.

Command and Control (C2)

Malicious actors remotely controlling infected machines.

Signup and view all the flashcards

Backdoor

Malware that provides unauthorized remote access.

Signup and view all the flashcards

Bloatware

Software that consumes system resources, slowing down performance.

Signup and view all the flashcards

Spyware

Malware that collects user data and browsing habits.

Signup and view all the flashcards

Malware Naming

Different security vendors identify malware with unique names.

Signup and view all the flashcards

Keylogger Data

Data inputted using a keyboard or other input device.

Signup and view all the flashcards

Ransomware

Malware that encrypts data and demands payment for decryption.

Signup and view all the flashcards

Rootkit Detection

Mounting the drive ensures rootkit cannot hide when scanned.

Signup and view all the flashcards

Logic Bomb

Code that executes malicious actions when specific conditions are met.

Signup and view all the flashcards

Malware Removal

Wiping the system and reinstalling from known good is best practice.

Signup and view all the flashcards

Worm vs. Virus

Viruses require user action, worms can self-replicate.

Signup and view all the flashcards

Analyze Python Code

Reviewing code in a text editor allows for analysis of functions.

Signup and view all the flashcards

Preventing Trojan

Blocking application store downloads mitigates a way for a trojan installation.

Signup and view all the flashcards

Worm

Malware that self-replicates across a network by exploiting vulnerabilities.

Signup and view all the flashcards

Bloatware

Pre-installed software that is unwanted and consumes resources.

Signup and view all the flashcards

Bot

Type of malware connects to a command and control system.

Signup and view all the flashcards

Virus

Malware that requires user execution to propagate.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser