mcq

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

malware

software created to harm systems, networks, devices, apps, or users.

2
New cards

ransomware

malware that takes over a device until a ransom is paid.

3
New cards

crypto malware

ransomware were an attacker prevents a user from accessing a file by encrypting until they pay ransom

4
New cards

lateral movement process

The method used by attackers to gain access to other devices on a network after the initial breach

5
New cards

trojan

malware disguised as legitimate software, think troy

6
New cards

trojan

a user downloads a malicious version of a legitimate app. The user runs the app, which collects user and device information and sends it to a remote server. The attacker can now control the device from the server. What malware is at play here?

7
New cards

Trinida

A trojan that delivered malware by posing as modified versions of WhatsApp

8
New cards

remote access trojans (RATS)

trojan that provide attackers with remote access to devices by posing as legitimate remote access tools.

9
New cards

command and control (c&c)

servers or systems attackers use to control comprimised devices

10
New cards

botnet

a network of infected hosts

11
New cards

worm

malware that is self-spreading and self-installing.

12
New cards

spyware

malware used to gather information on a system, person, or organization.

13
New cards

stalkerware

type of spyware used to illegally gather information on a romantic partner

14
New cards

hands-on-keyboard attack

An attack where the attacker is controlling the infected system in real-time

15
New cards

bloatware

unwanted software an apps installed on devices by manufactuers

16
New cards

call home function

function of a software or app where it contacts a remote server

17
New cards

virus

malware that self-copies and spreads after activation

18
New cards

memory-resident viruses

viruses that remain in a system’s memory while a device is running

19
New cards

non-memory resisdent virsus

viruses that shut down after execution and spreading

20
New cards

boot sector viruses

viruses that hide in the boot sector of a drive or other storage

21
New cards

macro viruses

viruses that use code within word processing apps or other apps to spread

22
New cards

email viruses

viruses that spread through email attachments or the email’s themselves

23
New cards

fileless virus

Viruses that spread via phishing emails and malicious websites by exploiting vulnerabilities in plug-ins and browsers themselves

24
New cards

keylogger

malware that captures keystrokes and other user input from a device

25
New cards

logicbomb

function or code within a program that executes when certain conditions are met but not independently

26
New cards

rootkits

malware that allows attackers to access resources through a backdoor

27
New cards

rootkit

what malware is difficult to detect with antimalware?

28
New cards

reverse proxy server

technique used by attackers where a compromised device initiates a connection with an attacker’s remote server.

29
New cards

backdoor

vulnerability that occurs during maitinance or troublshooting that attackers exploit for access