22 Questions
What is an advanced persistent threat (APT) characterized by?
Using a wide variety of intrusion technologies and malware against specific targets over an extended period
What is the primary purpose of a downloader?
To install other malicious software on a compromised system
What is the term for a set of tools used to generate new malware automatically?
Attack Kit
What is a type of malware that displays unwanted advertisements?
Adware
What is the term for a mechanism that bypasses normal security checks, allowing unauthorized access?
Backdoor
What is a type of attack that uses code on a compromised website to exploit a browser vulnerability?
Drive-by download
What is a primary reason why worms are ideal for spreading malicious payloads?
Because they can rapidly compromise a large number of systems
What technique do worms use to evade detection and skip past filters?
Polymorphic technique
What is a characteristic of metamorphic worms?
They change their appearance
What is a zero-day exploit?
An unknown vulnerability that is only discovered by the general network community when the worm is launched
How many zero-day exploits were discovered and exploited in 2015?
54
What is a primary goal of worm developers when spreading a worm?
To maximize the spread of the worm
Which type of malware is characterized by its ability to spread from system to system without the need for human interaction?
Worm
What is the primary goal of an Advanced Persistent Threat (APT)?
Theft of sensitive information
What is the term for malware that is designed to target a specific individual or organization?
Targeted malware
What is the term for the process of identifying potential targets for a malware attack?
Target selection
What is the term for the process of assessing the potential impact of a malware attack?
Threat assessment
What is the term for malware that is designed to remain undetected on a system?
Stealth malware
What is the term for the process of analyzing malware in a controlled environment?
Sandbox analysis
What is the term for the process of detecting and blocking malicious traffic at the network perimeter?
Perimeter scanning
What is the term for the process of identifying and mitigating vulnerabilities in software and systems?
Vulnerability management
What is the term for the process of responding to and managing a malware outbreak?
Incident response
This quiz will test your knowledge of the WannaCry ransomware attack that occurred in May 2017. Learn about the impact of the attack, how it worked, and how to recover from it.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free