Podcast
Questions and Answers
What is an Advanced Persistent Threat (APT) characterized by?
What is an Advanced Persistent Threat (APT) characterized by?
- An isolated malware attack on a single target.
- A type of adware that is integrated into software.
- A set of tools for generating new malware automatically.
- A targeted cybercrime campaign using multiple intrusion technologies and malware over an extended period. (correct)
What is the primary function of a downloader in a malware attack?
What is the primary function of a downloader in a malware attack?
- To break into new machines remotely.
- To bypass normal security checks.
- To exploit vulnerabilities in a browser.
- To install other malware on a compromised system. (correct)
What is a drive-by download?
What is a drive-by download?
- A set of tools for generating new malware automatically.
- A type of malware that avoids detection by security software.
- A type of adware that redirects a browser to a commercial site.
- An attack that uses code on a compromised website to exploit a browser vulnerability. (correct)
What is the term for a mechanism that bypasses normal security checks?
What is the term for a mechanism that bypasses normal security checks?
What is the primary purpose of an auto-rooter?
What is the primary purpose of an auto-rooter?
What is the term for a set of tools for generating new malware automatically?
What is the term for a set of tools for generating new malware automatically?
What is the primary goal of ransomware attacks like WannaCry?
What is the primary goal of ransomware attacks like WannaCry?
What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?
What is a characteristic of Advanced Persistent Threats (APTs)?
What is a characteristic of Advanced Persistent Threats (APTs)?
What is the primary goal of a phishing attack?
What is the primary goal of a phishing attack?
What is a rootkit?
What is a rootkit?
What is the primary goal of a drive-by-download attack?
What is the primary goal of a drive-by-download attack?
What is a malware countermeasure approach that involves running potentially malicious code in an emulated sandbox or on a virtual machine?
What is a malware countermeasure approach that involves running potentially malicious code in an emulated sandbox or on a virtual machine?
What is the primary goal of a logic bomb?
What is the primary goal of a logic bomb?
What is a characteristic of a worm?
What is a characteristic of a worm?
What is the term for a set of techniques used to trick users into assisting in the compromise of their own systems?
What is the term for a set of techniques used to trick users into assisting in the compromise of their own systems?
What technique do worms use to evade detection and foil real-time analysis?
What technique do worms use to evade detection and foil real-time analysis?
What is the primary purpose of using a zero-day exploit in a worm attack?
What is the primary purpose of using a zero-day exploit in a worm attack?
What is a characteristic of metamorphic worms?
What is a characteristic of metamorphic worms?
What is a common use of worms in malicious activities?
What is a common use of worms in malicious activities?
How do new worms typically penetrate systems?
How do new worms typically penetrate systems?