Podcast
Questions and Answers
Which type of malware is characterized by unexpected functionality?
Which type of malware is characterized by unexpected functionality?
- Trapdoor/backdoor
- Virus
- Worm
- Trojan horse (correct)
Which type of malware propagates actively?
Which type of malware propagates actively?
- Virus
- Trojan horse
- Worm (correct)
- Trapdoor/backdoor
What type of malware takes control before anything else?
What type of malware takes control before anything else?
- Virus (correct)
- Worm
- Trapdoor/backdoor
- Trojan horse
Which type of malware stays in memory?
Which type of malware stays in memory?
Which type of malware is particularly dangerous when present in compilers or virus checkers?
Which type of malware is particularly dangerous when present in compilers or virus checkers?
Which type of malware consumes system resources?
Which type of malware consumes system resources?
Which virus is considered a prototype for later viruses?
Which virus is considered a prototype for later viruses?
Which virus caused more annoyance than harm?
Which virus caused more annoyance than harm?
Which virus had little reaction from users upon its appearance?
Which virus had little reaction from users upon its appearance?
Which virus is an example of malware from 2012 and 2017?
Which virus is an example of malware from 2012 and 2017?
Which method of malware detection is effective on 'ordinary' malware but cannot detect unknown viruses or some advanced types of malware?
Which method of malware detection is effective on 'ordinary' malware but cannot detect unknown viruses or some advanced types of malware?
What is the advantage of Change Detection in malware detection?
What is the advantage of Change Detection in malware detection?
Which method of malware detection monitors the system for anything 'unusual' or 'virus-like' and requires defining what is considered 'normal'?
Which method of malware detection monitors the system for anything 'unusual' or 'virus-like' and requires defining what is considered 'normal'?
What is the disadvantage of Anomaly Detection in malware detection?
What is the disadvantage of Anomaly Detection in malware detection?
What is the advantage of Signature Detection in malware detection?
What is the advantage of Signature Detection in malware detection?
Which method of malware detection uses hash values to detect changes in files?
Which method of malware detection uses hash values to detect changes in files?
What is the disadvantage of Change Detection in malware detection?
What is the disadvantage of Change Detection in malware detection?
Which method of malware detection can even detect previously unknown malware?
Which method of malware detection can even detect previously unknown malware?
What is the disadvantage of Signature Detection in malware detection?
What is the disadvantage of Signature Detection in malware detection?
Which method of malware detection is often used in intrusion detection systems (IDS)?
Which method of malware detection is often used in intrusion detection systems (IDS)?
Which type of attack is the Flash Worm designed to carry out?
Which type of attack is the Flash Worm designed to carry out?
What is a botnet?
What is a botnet?
Which of the following botnets was used to steal credit card information?
Which of the following botnets was used to steal credit card information?
What is the purpose of using a whitelist in malware detection?
What is the purpose of using a whitelist in malware detection?
Why is the Flash Worm difficult to defend against?
Why is the Flash Worm difficult to defend against?
What is the purpose of encrypting the decryptor code in malware?
What is the purpose of encrypting the decryptor code in malware?
What is the estimated time for an ideal Flash Worm to infect the entire Internet?
What is the estimated time for an ideal Flash Worm to infect the entire Internet?
What is the main purpose of a botnet?
What is the main purpose of a botnet?
What is the advantage of using a P2P botnet architecture?
What is the advantage of using a P2P botnet architecture?
What is the purpose of using signature detection in malware analysis?
What is the purpose of using signature detection in malware analysis?