Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

TestOut Security Pro Terms Def / Q&A Chapter 7.1 Maleware

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term & Qustions
Def & Answers
What is the difference between a virus and a worm?   show
🗑
Which types of malware can be spread through email?   show
🗑
show  
🗑
show  
🗑
show  
🗑
In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations?   show
🗑
show Software designed to take over or damage a computer without the user's knowledge or approval.  
🗑
show A program that attempts to damage a computer system and replicate itself to other computer systems.  
🗑
Worm   show
🗑
show A malicious program that is disguised as legitimate or desirable software. • Cannot replicate itself. • Does not need to be attached to a host file. • Often contains spying functions (such as a packet sniffer) or backdoor functions • Often is hidden in useful software, such as screen savers or games. A wrapper is a program that is used legitimately, but has a Trojan attached to it that will infiltrate whichever computer runs the wrapper software. • Relies on user decisions and actions to spread.  
🗑
Zombie   show
🗑
Botnet   show
🗑
Rootkit   show
🗑
Logic Bomb   show
🗑
Spyware   show
🗑
Adware   show
🗑
Ransomware   show
🗑
Scareware   show
🗑
Crimeware   show
🗑
show Ransomware that encrypts files until a ransom is paid.  
🗑
show includes a back door that allows administrative control over the target computer. Usually downloaded invisibly with a user-requested program, RAT can: • Use keystroke loggers, which capture keystrokes, mouse operations, or screenshots and transmits those actions back to the attacker to obtain passwords • Access confidential information, • Format drives • Activate a system's webcam and record video • Delete, download, or alter files and file systems • Distribute viruses and other malware  
🗑
show A person that commits computer and cyber crimes by gaining unauthorized access to computer systems.  
🗑
show A person that is actively engaged in developing and distributing worms, -greatest threat to information resources -Developing and distributing worms, Trojans, and viruses - Engaging in probing and reconnaissance activities Creating toolkits so that others can hack known vulnerabilities - Cracking the protective measures included with commercial application software by using reverse engineering  
🗑
Script Kiddy   show
🗑
3 key Characteristics of a virus?   show
🗑
show Masks its self and will attempt to hide.  
🗑
show A macro virus exploits applications such as Microsoft Office that use macros. A macro virus can take advantage of this feature and embed itself into a Word file. Then when that file is opened and that macro is activated, it runs and it could then potentially cause significant damage and spread itself to other machines.  
🗑
Polymorphic Virus   show
🗑
Retro Virus   show
🗑
show is designed to make itself difficult to detect or analyze by covering itself with protective code. makes itself difficult to detect by covering itself with a type of protective code.  
🗑
Companion Virus   show
🗑
show Anti-malware software  
🗑
What does real-time protection do?   show
🗑
How to worms infect a system?   show
🗑
How do you avoid worm infections   show
🗑
show The attackers computer that in controlling the zombie or bot  
🗑
show a zombied computer  
🗑
bot herder   show
🗑
How do you discover that you have a Trojan or you are a zombie   show
🗑
How to defend against a Trojan   show
🗑
show Unified Extensible Firmware Interface is a specification for a software program that connects a computer's firmware to its operating system (OS)  
🗑
What are the strategies that you can use to prevent rootkit infections   show
🗑
show On newer versions of Windows, this is done using the secure boot feature.  
🗑
show use a pop-up blocker as well as to install anti-malware software.  
🗑
phage virus   show
🗑
show is a program that is used legitimately, but has a Trojan attached to it that will infiltrate whichever computer runs the wrapper software.  
🗑
asynchronous attack   show
🗑
White hat hackers   show
🗑
show are people who unethically test or exploit the vulnerabilities of computer systems.  
🗑
Grey hat hackers   show
🗑
Click Kiddy   show
🗑
show is a term used to refer to people who break into telecommunications networks to illegally use the provider's services.  
🗑
show The 1987 Stoned virus was one of the very first viruses, and was very common and widespread in the early 1990s. The virus infects the master boot record of a hard drive and floppy disks.  
🗑
show The 1991 Michelangelo virus was designed to infect MS-DOS systems and remain dormant until March 6, the birthday of Renaissance artist Michelangelo. The virus infects the master boot record of a hard drive. Once a system becomes infected, any floppy disk inserted into the system becomes immediately infected, as well.  
🗑
CIH/Chernobyl Virus   show
🗑
show The 1999 Melissa worm was the first widely distributed macro virus which was propagated in the form of an email message containing an infected Word document as an attachment.  
🗑
I Love You   show
🗑
Code Red   show
🗑
Nimda   show
🗑
Klez   show
🗑
A collection of zombie computers have been set up to collect personal information. What type of malware do the zombie computers represent?   show
🗑
Which is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously?   show
🗑
show Rootkit A rootkit is a set of programs that allows attackers to maintain permanent, administrator-level, hidden access to a computer. A rootkit: • Is almost invisible software • Resides below regular antivirus software detection • Requires administrator privileges for installation, then maintains those privileges to allow subsequent access • Might not be malicious • Often replaces operating system files with alternate versions that allow hidden access  
🗑
show A rootkit is a set of programs that allows attackers to maintain hidden, permanent, administrator-level access to a computer. A rootkit: • Is almost invisible software • Resides below regular antivirus software detection • Requires administrator privileges for installation, then maintains those privileges to allow subsequent access • Might not be malicious • Often replaces operating system files with alternate versions that allow hidden access  
🗑
show Rootkit This program is an example of a rootkit. A rootkit is a set of programs that allow attackers to maintain permanent, administrator-level, and hidden access to a computer. Rootkits require administrator access for installation and typically gain this access using a Trojan horse approach--masquerading as a legitimate program to entice users to install the software.  
🗑
show It monitors the actions you take on your machine and sends the information back to its originating source.  
🗑
show Self-replication The primary distinguishing characteristic between a worm and a logic bomb is self-replication. Worms are designed to replicate and spread as quickly and as broadly as possible. Logic bombs do not self-replicate. They are designed for a specific single system or type of system. Once planted on a system, it remains there until it is triggered.  
🗑
You have installed anti-malware software that checks for viruses in email attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file?   show
🗑
What is another name for a logic bomb?   show
🗑
show Anti-virus software should be configured to download updated virus definition files as soon as they become available. Anti-virus software is only effective against new viruses if it has the latest virus definition files installed. You should configure your anti-virus software to automatically download updated virus definition files as soon as they become available.  
🗑
show Update your virus detection software.  
🗑
You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day. What else should you do to protect your systems from malware? (Select two.) -Disable UAC -Schedule regular full system scans -Enable chassis intrusion detection -Enable account lockout -Educate users about malware   show
🗑
To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. What could you do to help prevent this?   show
🗑
show Stealth Stealth viruses reside in low-level system service functions where they intercept system requests and alter service outputs to conceal their presence. The term rootkit is often used to describe a malicious program that can hide itself and prevent its removal from the system.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: jacobth