WannaCry Ransomware Attack 2017
21 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is an Advanced Persistent Threat (APT) characterized by?

  • An isolated malware attack on a single target.
  • A type of adware that is integrated into software.
  • A set of tools for generating new malware automatically.
  • A targeted cybercrime campaign using multiple intrusion technologies and malware over an extended period. (correct)
  • What is the primary function of a downloader in a malware attack?

  • To break into new machines remotely.
  • To bypass normal security checks.
  • To exploit vulnerabilities in a browser.
  • To install other malware on a compromised system. (correct)
  • What is a drive-by download?

  • A set of tools for generating new malware automatically.
  • A type of malware that avoids detection by security software.
  • A type of adware that redirects a browser to a commercial site.
  • An attack that uses code on a compromised website to exploit a browser vulnerability. (correct)
  • What is the term for a mechanism that bypasses normal security checks?

    <p>Backdoor</p> Signup and view all the answers

    What is the primary purpose of an auto-rooter?

    <p>To break into new machines remotely.</p> Signup and view all the answers

    What is the term for a set of tools for generating new malware automatically?

    <p>Attack Kit</p> Signup and view all the answers

    What is the primary goal of ransomware attacks like WannaCry?

    <p>To demand a ransom payment in exchange for restoring access to encrypted files</p> Signup and view all the answers

    What is the term for programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?

    <p>Mobile code</p> Signup and view all the answers

    What is a characteristic of Advanced Persistent Threats (APTs)?

    <p>They are launched by nation-state sponsored hackers</p> Signup and view all the answers

    What is the primary goal of a phishing attack?

    <p>To steal sensitive information</p> Signup and view all the answers

    What is a rootkit?

    <p>A set of hidden programs installed on a system to maintain covert access</p> Signup and view all the answers

    What is the primary goal of a drive-by-download attack?

    <p>To install malware on a system without user interaction</p> Signup and view all the answers

    What is a malware countermeasure approach that involves running potentially malicious code in an emulated sandbox or on a virtual machine?

    <p>Sandbox analysis</p> Signup and view all the answers

    What is the primary goal of a logic bomb?

    <p>To wait for a specific trigger to launch an attack</p> Signup and view all the answers

    What is a characteristic of a worm?

    <p>It spreads from system to system without user interaction</p> Signup and view all the answers

    What is the term for a set of techniques used to trick users into assisting in the compromise of their own systems?

    <p>Social engineering</p> Signup and view all the answers

    What technique do worms use to evade detection and foil real-time analysis?

    <p>Polymorphic technique</p> Signup and view all the answers

    What is the primary purpose of using a zero-day exploit in a worm attack?

    <p>To achieve maximum surprise and distribution</p> Signup and view all the answers

    What is a characteristic of metamorphic worms?

    <p>They have a repertoire of behavior patterns unleashed at different stages of propagation</p> Signup and view all the answers

    What is a common use of worms in malicious activities?

    <p>Spreading a wide variety of malicious payloads</p> Signup and view all the answers

    How do new worms typically penetrate systems?

    <p>Using exploits against various network-based applications</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser