WannaCry Ransomware Attack 2017

HotIndium avatar
HotIndium
·
·
Download

Start Quiz

Study Flashcards

22 Questions

What is an advanced persistent threat (APT) characterized by?

Using a wide variety of intrusion technologies and malware against specific targets over an extended period

What is the primary purpose of a downloader?

To install other malicious software on a compromised system

What is the term for a set of tools used to generate new malware automatically?

Attack Kit

What is a type of malware that displays unwanted advertisements?

Adware

What is the term for a mechanism that bypasses normal security checks, allowing unauthorized access?

Backdoor

What is a type of attack that uses code on a compromised website to exploit a browser vulnerability?

Drive-by download

What is a primary reason why worms are ideal for spreading malicious payloads?

Because they can rapidly compromise a large number of systems

What technique do worms use to evade detection and skip past filters?

Polymorphic technique

What is a characteristic of metamorphic worms?

They change their appearance

What is a zero-day exploit?

An unknown vulnerability that is only discovered by the general network community when the worm is launched

How many zero-day exploits were discovered and exploited in 2015?

54

What is a primary goal of worm developers when spreading a worm?

To maximize the spread of the worm

Which type of malware is characterized by its ability to spread from system to system without the need for human interaction?

Worm

What is the primary goal of an Advanced Persistent Threat (APT)?

Theft of sensitive information

What is the term for malware that is designed to target a specific individual or organization?

Targeted malware

What is the term for the process of identifying potential targets for a malware attack?

Target selection

What is the term for the process of assessing the potential impact of a malware attack?

Threat assessment

What is the term for malware that is designed to remain undetected on a system?

Stealth malware

What is the term for the process of analyzing malware in a controlled environment?

Sandbox analysis

What is the term for the process of detecting and blocking malicious traffic at the network perimeter?

Perimeter scanning

What is the term for the process of identifying and mitigating vulnerabilities in software and systems?

Vulnerability management

What is the term for the process of responding to and managing a malware outbreak?

Incident response

This quiz will test your knowledge of the WannaCry ransomware attack that occurred in May 2017. Learn about the impact of the attack, how it worked, and how to recover from it.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser