Virus Classifications and Concealment Strategies

LighterArtNouveau avatar
LighterArtNouveau
·
·
Download

Start Quiz

Study Flashcards

24 Questions

What is the primary function of a worm?

To actively seek out more machines to infect

How do email worms typically spread?

Through script code included in email attachments

What is a common way for worms to replicate themselves?

By creating a copy of themselves on removable media

What is a characteristic of a metamorphic virus?

It mutates and rewrites itself completely at each iteration

What is the purpose of a payload in a worm?

To carry out malicious activities

How do worms often target systems for infection?

Through software exploits

What is a common way for worms to spread through networks?

Through network connections from system to system

What is the first known implementation of a worm?

In the early 1980s at Xerox Palo Alto Labs

What is a key characteristic that distinguishes a bot from a worm?

Remote control facility

What is a common protocol used for covert communication channels in recent botnets?

HTTP

What is the primary function of a keylogger?

To capture keystrokes

What is the goal of a phishing attack?

To leverage user trust

What is a characteristic of spear-phishing attacks?

Recipients are carefully researched

What is a common way that malware is spread through email?

Through phishing attacks

What is a common task performed by spyware?

Redirecting web page requests

What is a primary difference between bots and worms in terms of propagation?

Worms are self-replicating, while bots are not

How does the CommWarrior worm replicate to other phones?

By sending itself as an MMS file to contacts and as an auto reply to incoming text messages

What is the primary target of mobile phone worms?

The smartphone's operating system

How do drive-by-downloads deliver their payload?

By exploiting browser and plugin vulnerabilities

What is the primary method of remote execution used by drive-by-downloads?

By exploiting vulnerabilities in the browser

How do watering-hole attacks differ from drive-by-downloads?

They are more targeted and focused on specific organizations

How do mobile phone worms spread through email?

They do not spread through email

What is the primary goal of a watering-hole attack?

To target a specific organization or individual

What is the primary difference between a drive-by-download and a watering-hole attack?

The target of the attack

This quiz covers different types of virus classifications, including encrypted, stealth, polymorphic, and metamorphic viruses, and their concealment strategies. Learn how each type of virus works to evade detection.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser