Viruses and Malware

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/448

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

449 Terms

1
New cards

Q: What is malware?

2
New cards

A: Malicious software designed to harm or exploit computer systems.

3
New cards
4
New cards

Q: What are the two main characteristics of infectious malware?

5
New cards

A: Viruses and worms.

6
New cards
7
New cards

Q: What type of malware focuses on concealment?

8
New cards

A: Trojan horses, logic bombs, and rootkits.

9
New cards
10
New cards

Q: Name three types of malware designed for stealing information.

11
New cards

A: Spyware, keyloggers, and screen scrapers.

12
New cards
13
New cards

Q: What malware type is used for profit?

14
New cards

A: Dialers, scareware, and ransomware.

15
New cards
16
New cards

Q: What malware can act as a platform for other attacks?

17
New cards

A: Botnets and backdoors (trapdoors).

18
New cards
19
New cards

Q: What is a Trojan horse?

20
New cards

A: Software that appears to perform a desirable function but secretly performs malicious acts.

21
New cards
22
New cards

Q: How does a Trojan horse typically gain execution?

23
New cards

A: The user is tricked into executing it, expecting normal behavior.

24
New cards
25
New cards

Q: What is a trapdoor or backdoor?

26
New cards

A: A secret entry point into a system that bypasses normal security.

27
New cards
28
New cards

Q: Who commonly uses backdoors?

29
New cards

A: Developers, sometimes for debugging.

30
New cards
31
New cards

Q: What is a logic bomb?

32
New cards

A: Malware embedded in legitimate programs that activates under specific conditions.

33
New cards
34
New cards

Q: Give an example of a logic bomb trigger.

35
New cards

A: A specific date/time, presence of a file, or a particular user.

36
New cards
37
New cards

Q: What was the 1982 Trans-Siberian Pipeline incident?

38
New cards

A: A CIA-planted logic bomb caused a massive explosion in a Soviet pipeline.

39
New cards
40
New cards

Q: What does spyware do?

41
New cards

A: Collects information about users without their knowledge.

42
New cards
43
New cards

Q: What is a keylogger?

44
New cards

A: Spyware that records keystrokes.

45
New cards
46
New cards

Q: What is a screen scraper?

47
New cards

A: Spyware that reads data from a computer display.

48
New cards
49
New cards

Q: What is scareware?

50
New cards

A: Malware that scares victims into compromising their own security (e.g., fake antivirus).

51
New cards
52
New cards

Q: What is ransomware?

53
New cards

A: Malware that holds a system or data hostage until a ransom is paid.

54
New cards
55
New cards

Q: What were early ransomware types called?

56
New cards

A: Cryptoviruses, cryptotrojans, or cryptoworms.

57
New cards
58
New cards

Q: How does ransomware typically work?

59
New cards

A: Encrypts files and demands payment for decryption.

60
New cards
61
New cards

Q: What is a computer virus?

62
New cards

A: Self-replicating code that attaches to a host program and infects other files.

63
New cards
64
New cards

Q: What condition must be met for a virus to spread?

65
New cards

A: The infected code must be executed.

66
New cards
67
New cards

Q: What is a worm?

68
New cards

A: Self-replicating malware that does not require a host program.

69
New cards
70
New cards

Q: How does a worm spread?

71
New cards

A: Propagates a fully working version to other machines over a network.

72
New cards
73
New cards

Q: What are the phases of a worm attack?

74
New cards

A: Probing → Exploitation → Replication → Payload.

75
New cards
76
New cards

Q: What was the Morris Worm?

77
New cards

A: The first major worm, released in November 1988 by Robert Morris.

78
New cards
79
New cards

Q: What two parts did the Morris Worm consist of?

80
New cards

A: A main program to spread and a vector program to infect.

81
New cards
82
New cards

Q: What was Vector 1 of the Morris Worm?

83
New cards

A: Exploiting the debug feature of sendmail.

84
New cards
85
New cards

Q: What was Vector 2 of the Morris Worm?

86
New cards

A: Exploiting a buffer overflow in fingerd using gets().

87
New cards
88
New cards

Q: What was Vector 3 of the Morris Worm?

89
New cards

A: Exploiting trust in remote login (rlogin/rsh) and password cracking.

90
New cards
91
New cards

Q: How did the Morris Worm hide itself?

92
New cards

A: It disguised itself as 'sh' in process lists and hid files.

93
New cards
94
New cards

Q: What bug made the Morris Worm especially damaging?

95
New cards

A: It re-infected hosts with a 1/8 probability even if they were already compromised.

96
New cards
97
New cards

Q: What was Code Red?

98
New cards

A: A worm from July 2001 that infected 360,000 servers in 14 hours.

99
New cards
100
New cards

Q: What vulnerability did Code Red exploit?