Unveiling the Dark Side
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of malware is characterized by unexpected functionality?

  • Trapdoor/backdoor
  • Virus
  • Worm
  • Trojan horse (correct)

Which type of malware propagates actively?

  • Virus
  • Trojan horse
  • Worm (correct)
  • Trapdoor/backdoor

What type of malware takes control before anything else?

  • Virus (correct)
  • Worm
  • Trapdoor/backdoor
  • Trojan horse

Which type of malware stays in memory?

<p>Worm (C)</p> Signup and view all the answers

Which type of malware is particularly dangerous when present in compilers or virus checkers?

<p>Virus (C)</p> Signup and view all the answers

Which type of malware consumes system resources?

<p>Trapdoor/backdoor (B)</p> Signup and view all the answers

Which virus is considered a prototype for later viruses?

<p>Brain virus (B)</p> Signup and view all the answers

Which virus caused more annoyance than harm?

<p>Brain virus (D)</p> Signup and view all the answers

Which virus had little reaction from users upon its appearance?

<p>Brain virus (D)</p> Signup and view all the answers

Which virus is an example of malware from 2012 and 2017?

<p>Shamoon (D)</p> Signup and view all the answers

Which method of malware detection is effective on 'ordinary' malware but cannot detect unknown viruses or some advanced types of malware?

<p>Signature Detection (A)</p> Signup and view all the answers

What is the advantage of Change Detection in malware detection?

<p>Can detect previously unknown malware (B)</p> Signup and view all the answers

Which method of malware detection monitors the system for anything 'unusual' or 'virus-like' and requires defining what is considered 'normal'?

<p>Anomaly Detection (C)</p> Signup and view all the answers

What is the disadvantage of Anomaly Detection in malware detection?

<p>No proven track record (A)</p> Signup and view all the answers

What is the advantage of Signature Detection in malware detection?

<p>Effective on 'ordinary' malware (A)</p> Signup and view all the answers

Which method of malware detection uses hash values to detect changes in files?

<p>Change Detection (B)</p> Signup and view all the answers

What is the disadvantage of Change Detection in malware detection?

<p>Many files change and often (A)</p> Signup and view all the answers

Which method of malware detection can even detect previously unknown malware?

<p>Change Detection (B)</p> Signup and view all the answers

What is the disadvantage of Signature Detection in malware detection?

<p>All of the above (D)</p> Signup and view all the answers

Which method of malware detection is often used in intrusion detection systems (IDS)?

<p>Anomaly Detection (C)</p> Signup and view all the answers

Which type of attack is the Flash Worm designed to carry out?

<p>Denial of Service (DoS) attacks (B)</p> Signup and view all the answers

What is a botnet?

<p>A network of infected machines (B)</p> Signup and view all the answers

Which of the following botnets was used to steal credit card information?

<p>Mariposa (D)</p> Signup and view all the answers

What is the purpose of using a whitelist in malware detection?

<p>To detect good code (A)</p> Signup and view all the answers

Why is the Flash Worm difficult to defend against?

<p>It infects the entire Internet in a short amount of time (C)</p> Signup and view all the answers

What is the purpose of encrypting the decryptor code in malware?

<p>To make it more difficult to detect (C)</p> Signup and view all the answers

What is the estimated time for an ideal Flash Worm to infect the entire Internet?

<p>2 seconds (C)</p> Signup and view all the answers

What is the main purpose of a botnet?

<p>To launch DoS attacks (B)</p> Signup and view all the answers

What is the advantage of using a P2P botnet architecture?

<p>It is more difficult to detect and take down (C)</p> Signup and view all the answers

What is the purpose of using signature detection in malware analysis?

<p>To detect metamorphic copies of existing malware (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser