WannaCry Ransomware Attack 2017
21 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is an Advanced Persistent Threat (APT) characterized by?

  • An isolated malware attack on a single target.
  • A type of adware that is integrated into software.
  • A set of tools for generating new malware automatically.
  • A targeted cybercrime campaign using multiple intrusion technologies and malware over an extended period. (correct)

What is the primary function of a downloader in a malware attack?

  • To break into new machines remotely.
  • To bypass normal security checks.
  • To exploit vulnerabilities in a browser.
  • To install other malware on a compromised system. (correct)

What is a drive-by download?

  • A set of tools for generating new malware automatically.
  • A type of malware that avoids detection by security software.
  • A type of adware that redirects a browser to a commercial site.
  • An attack that uses code on a compromised website to exploit a browser vulnerability. (correct)

What is the term for a mechanism that bypasses normal security checks?

<p>Backdoor (D)</p> Signup and view all the answers

What is the primary purpose of an auto-rooter?

<p>To break into new machines remotely. (A)</p> Signup and view all the answers

What is the term for a set of tools for generating new malware automatically?

<p>Attack Kit (B)</p> Signup and view all the answers

What is the primary goal of ransomware attacks like WannaCry?

<p>To demand a ransom payment in exchange for restoring access to encrypted files (A)</p> Signup and view all the answers

What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?

<p>Mobile code (A)</p> Signup and view all the answers

What is a characteristic of Advanced Persistent Threats (APTs)?

<p>They are launched by nation-state sponsored hackers (C)</p> Signup and view all the answers

What is the primary goal of a phishing attack?

<p>To steal sensitive information (B)</p> Signup and view all the answers

What is a rootkit?

<p>A set of hidden programs installed on a system to maintain covert access (C)</p> Signup and view all the answers

What is the primary goal of a drive-by-download attack?

<p>To install malware on a system without user interaction (B)</p> Signup and view all the answers

What is a malware countermeasure approach that involves running potentially malicious code in an emulated sandbox or on a virtual machine?

<p>Sandbox analysis (A)</p> Signup and view all the answers

What is the primary goal of a logic bomb?

<p>To wait for a specific trigger to launch an attack (A)</p> Signup and view all the answers

What is a characteristic of a worm?

<p>It spreads from system to system without user interaction (A)</p> Signup and view all the answers

What is the term for a set of techniques used to trick users into assisting in the compromise of their own systems?

<p>Social engineering (C)</p> Signup and view all the answers

What technique do worms use to evade detection and foil real-time analysis?

<p>Polymorphic technique (A)</p> Signup and view all the answers

What is the primary purpose of using a zero-day exploit in a worm attack?

<p>To achieve maximum surprise and distribution (D)</p> Signup and view all the answers

What is a characteristic of metamorphic worms?

<p>They have a repertoire of behavior patterns unleashed at different stages of propagation (A)</p> Signup and view all the answers

What is a common use of worms in malicious activities?

<p>Spreading a wide variety of malicious payloads (C)</p> Signup and view all the answers

How do new worms typically penetrate systems?

<p>Using exploits against various network-based applications (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser