TestOut Security Pro Terms Def / Q&A Chapter 7.1 Maleware
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
What is the difference between a virus and a worm? | show 🗑
|
||||
Which types of malware can be spread through email? | show 🗑
|
||||
show |
🗑
|
||||
show |
🗑
|
||||
show |
🗑
|
||||
In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations? | show 🗑
|
||||
show | Software designed to take over or damage a computer without the user's knowledge or approval.
🗑
|
||||
show | A program that attempts to damage a computer system and replicate itself to other computer systems.
🗑
|
||||
Worm | show 🗑
|
||||
show | A malicious program that is disguised as legitimate or desirable software.
• Cannot replicate itself.
• Does not need to be attached to a host file.
• Often contains spying functions (such as a packet sniffer) or backdoor functions
• Often is hidden in useful software, such as screen savers or games. A wrapper is a program that is used legitimately, but has a Trojan attached to it that will infiltrate whichever computer runs the wrapper software.
• Relies on user decisions and actions to spread.
🗑
|
||||
Zombie | show 🗑
|
||||
Botnet | show 🗑
|
||||
Rootkit | show 🗑
|
||||
Logic Bomb | show 🗑
|
||||
Spyware | show 🗑
|
||||
Adware | show 🗑
|
||||
Ransomware | show 🗑
|
||||
Scareware | show 🗑
|
||||
Crimeware | show 🗑
|
||||
show | Ransomware that encrypts files until a ransom is paid.
🗑
|
||||
show | includes a back door that allows administrative control over the target computer. Usually downloaded invisibly with a user-requested program, RAT can:
• Use keystroke loggers, which capture keystrokes, mouse operations, or screenshots and transmits those actions back to the attacker to obtain passwords
• Access confidential information,
• Format drives
• Activate a system's webcam and record video
• Delete, download, or alter files and file systems
• Distribute viruses and other malware
🗑
|
||||
show | A person that commits computer and cyber crimes by gaining unauthorized access to computer systems.
🗑
|
||||
show | A person that is actively engaged in developing and distributing worms,
-greatest threat to information resources
-Developing and distributing worms, Trojans, and viruses
- Engaging in probing and reconnaissance activities
Creating toolkits so that others can hack known vulnerabilities
- Cracking the protective measures included with commercial application software by using reverse engineering
🗑
|
||||
Script Kiddy | show 🗑
|
||||
3 key Characteristics of a virus? | show 🗑
|
||||
show | Masks its self and will attempt to hide.
🗑
|
||||
show | A macro virus exploits applications such as Microsoft Office that use macros.
A macro virus can take advantage of this feature and embed itself into a Word file. Then when that file is opened and that macro is activated, it runs and it could then potentially cause significant damage and spread itself to other machines.
🗑
|
||||
Polymorphic Virus | show 🗑
|
||||
Retro Virus | show 🗑
|
||||
show | is designed to make itself difficult to detect or analyze by covering itself with protective code.
makes itself difficult to detect by covering itself with a type of protective code.
🗑
|
||||
Companion Virus | show 🗑
|
||||
show | Anti-malware software
🗑
|
||||
What does real-time protection do? | show 🗑
|
||||
How to worms infect a system? | show 🗑
|
||||
How do you avoid worm infections | show 🗑
|
||||
show | The attackers computer that in controlling the zombie or bot
🗑
|
||||
show | a zombied computer
🗑
|
||||
bot herder | show 🗑
|
||||
How do you discover that you have a Trojan or you are a zombie | show 🗑
|
||||
How to defend against a Trojan | show 🗑
|
||||
show | Unified Extensible Firmware Interface is a specification for a software program that connects a computer's firmware to its operating system (OS)
🗑
|
||||
What are the strategies that you can use to prevent rootkit infections | show 🗑
|
||||
show | On newer versions of Windows, this is done using the secure boot feature.
🗑
|
||||
show | use a pop-up blocker as well as to install anti-malware software.
🗑
|
||||
phage virus | show 🗑
|
||||
show | is a program that is used legitimately, but has a Trojan attached to it that will infiltrate whichever computer runs the wrapper software.
🗑
|
||||
asynchronous attack | show 🗑
|
||||
White hat hackers | show 🗑
|
||||
show | are people who unethically test or exploit the vulnerabilities of computer systems.
🗑
|
||||
Grey hat hackers | show 🗑
|
||||
Click Kiddy | show 🗑
|
||||
show | is a term used to refer to people who break into telecommunications networks to illegally use the provider's services.
🗑
|
||||
show | The 1987 Stoned virus was one of the very first viruses, and was very common and widespread in the early 1990s. The virus infects the master boot record of a hard drive and floppy disks.
🗑
|
||||
show | The 1991 Michelangelo virus was designed to infect MS-DOS systems and remain dormant until March 6, the birthday of Renaissance artist Michelangelo. The virus infects the master boot record of a hard drive. Once a system becomes infected, any floppy disk inserted into the system becomes immediately infected, as well.
🗑
|
||||
CIH/Chernobyl Virus | show 🗑
|
||||
show | The 1999 Melissa worm was the first widely distributed macro virus which was propagated in the form of an email message containing an infected Word document as an attachment.
🗑
|
||||
I Love You | show 🗑
|
||||
Code Red | show 🗑
|
||||
Nimda | show 🗑
|
||||
Klez | show 🗑
|
||||
A collection of zombie computers have been set up to collect personal information. What type of malware do the zombie computers represent? | show 🗑
|
||||
Which is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously? | show 🗑
|
||||
show | Rootkit
A rootkit is a set of programs that allows attackers to maintain permanent, administrator-level, hidden access to a computer. A rootkit:
• Is almost invisible software
• Resides below regular antivirus software detection
• Requires administrator privileges for installation, then maintains those privileges to allow subsequent access
• Might not be malicious
• Often replaces operating system files with alternate versions that allow hidden access
🗑
|
||||
show | A rootkit is a set of programs that allows attackers to maintain hidden, permanent, administrator-level access to a computer. A rootkit:
• Is almost invisible software
• Resides below regular antivirus software detection
• Requires administrator privileges for installation, then maintains those privileges to allow subsequent access
• Might not be malicious
• Often replaces operating system files with alternate versions that allow hidden access
🗑
|
||||
show | Rootkit
This program is an example of a rootkit. A rootkit is a set of programs that allow attackers to maintain permanent, administrator-level, and hidden access to a computer. Rootkits require administrator access for installation and typically gain this access using a Trojan horse approach--masquerading as a legitimate program to entice users to install the software.
🗑
|
||||
show | It monitors the actions you take on your machine and sends the information back to its originating source.
🗑
|
||||
show | Self-replication
The primary distinguishing characteristic between a
worm and a logic bomb is self-replication.
Worms are designed to replicate and spread as quickly and as broadly as possible.
Logic bombs do not self-replicate. They are designed for a specific single system or type of system. Once planted on a system, it remains there until it is triggered.
🗑
|
||||
You have installed anti-malware software that checks for viruses in email attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file? | show 🗑
|
||||
What is another name for a logic bomb? | show 🗑
|
||||
show | Anti-virus software should be configured to download updated virus definition files as soon as they become available.
Anti-virus software is only effective against new viruses if it has the latest virus definition files installed. You should configure your anti-virus software to automatically download updated virus definition files as soon as they become available.
🗑
|
||||
show | Update your virus detection software.
🗑
|
||||
You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day. What else should you do to protect your systems from malware? (Select two.) -Disable UAC -Schedule regular full system scans -Enable chassis intrusion detection -Enable account lockout -Educate users about malware | show 🗑
|
||||
To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. What could you do to help prevent this? | show 🗑
|
||||
show | Stealth
Stealth viruses reside in low-level system service functions where they intercept system requests and alter service outputs to conceal their presence. The term rootkit is often used to describe a malicious program that can hide itself and prevent its removal from the system.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
jacobth