📘 Chapter 2 – Malware and Social Engineering Attacks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

56 Terms

1
New cards

Q: What is malware?

A: Malicious software that enters a system without the user’s knowledge or consent.

2
New cards

Q: How does malware work?

A: Uses a threat vector to deliver a malicious payload that performs harmful actions.

3
New cards

Q: How can malware be classified?

A: By its primary trait:

  • Circulation

  • Infection

  • Concealment

  • Payload capabilities

4
New cards

Q: Which malware types focus on circulation?

A: Viruses and worms.

5
New cards

Q: What is a program virus?

A: A virus that infects executable files.

6
New cards

Q: What is a macro virus?

A: A virus written in macro scripts inside data files.

7
New cards

Q: What is an appender infection?

A: Virus attaches itself to the end of a file.

8
New cards

Q: Why are appender infections easier to detect?

A: File size changes are noticeable.

9
New cards

Q: What is an armored virus?

A: A virus designed to avoid detection.

10
New cards

Q: What is Swiss cheese infection?

A: Virus injects scrambled code into executable files.

11
New cards

Q: What is split infection?

A: Virus splits into multiple parts scattered in a file.

12
New cards

Q: What is an oligomorphic virus?

A: Changes to one of several predefined forms.

13
New cards

Q: What is a polymorphic virus?

A: Completely changes form on each execution.

14
New cards

Q: What is a metamorphic virus?

A: Rewrites its own code every time it runs.

15
New cards

Q: What two actions do viruses perform?

A:

  • Execute a payload

  • Reproduce by infecting files

16
New cards

Q: Can viruses spread automatically over a network?

A: No, they require user action.

17
New cards

Q: What is a worm?

A: Malware that spreads automatically across networks.

18
New cards

Q: Do worms require user action?

A: No.

19
New cards

Q: Do worms infect files?

A: No.

20
New cards

Q: Key difference between virus and worm?

A:

  • Virus: needs user action, infects files

  • Worm: spreads autonomously over networks

21
New cards

Q: Which malware types focus on infection?

A:

  • Trojans

  • Ransomware

  • Crypto-malware

22
New cards

Q: What is a Trojan?

A: A program that performs hidden malicious actions.

23
New cards

Q: What is a Remote Access Trojan (RAT)?

A: Trojan that gives attackers remote control of a system.

24
New cards

Q: What is ransomware?

A: Malware that locks systems until ransom is paid.

25
New cards

Q: Why is ransomware profitable?

A: Victims are pressured to pay quickly.

26
New cards

Q: What is crypto-malware?

A: Ransomware that encrypts all files.

27
New cards

Q: How does crypto-malware work?

A:

  • Contacts C&C server

  • Encrypts files

  • Sends decryption key only after payment

28
New cards

Q: What is a rootkit?

A: Malware that hides itself and other malicious activity.

29
New cards

Q: Why are rootkits dangerous?

A: The system can no longer be trusted.

30
New cards

Q: What are common malware payloads?

A:

  • Collect data

  • Delete data

  • Modify security settings

  • Launch attacks

31
New cards

Q: What is spyware?

A: Software that secretly collects personal data.

32
New cards

Q: What is a keylogger?

A: Records keystrokes to capture sensitive data.

33
New cards

Q: Hardware vs software keyloggers?

A:

  • Hardware: physical device

  • Software: installed remotely

34
New cards

Q: What is adware?

A: Malware that displays unwanted advertisements.

35
New cards

Q: Why is adware disliked?

A: Slows systems, disrupts productivity, shows unwanted content.

36
New cards

Q: What is a logic bomb?

A: Dormant code triggered by a specific event.

37
New cards

Q: What is a backdoor?

A: Hidden access that bypasses security controls.

38
New cards

Q: What is a bot (zombie)?

A: An infected system controlled remotely.

39
New cards

Q: What is a botnet?

A: A network of bots controlled by an attacker.

40
New cards

Q: Common botnet uses?

A:

  • Spam

  • Malware distribution

  • DDoS attacks

  • Poll manipulation

41
New cards

Q: What is social engineering?

A: Manipulating people to gain information or access.

42
New cards

Q: Common psychological social engineering methods?

A:

  • Impersonation

  • Phishing

  • Spam

  • Hoaxes

  • Watering hole attacks

43
New cards

Q: What is impersonation?

A: Pretending to be a trusted authority.

44
New cards

Q: What is phishing?

A: Fake messages tricking users into revealing data.

45
New cards

Q: What is spear phishing?

A: Targeted phishing.

46
New cards

Q: What is whaling?

A: Phishing aimed at executives.

47
New cards

Q: What is vishing?

A: Phishing via phone calls.

48
New cards

Q: What is spam?

A: Unsolicited email, often used to spread malware.

49
New cards

Q: What is image spam?

A: Spam using images to bypass filters.

50
New cards

Q: What is a hoax?

A: Fake warnings that trick users into weakening security.

51
New cards

Q: What is a watering hole attack?

A: Compromising a website frequently visited by a target group.

52
New cards

Q: Two common physical attacks?

A:

  • Dumpster diving

  • Tailgating

53
New cards

Q: What is dumpster diving?

A: Searching trash for sensitive information.

54
New cards

Q: What is Google dorking?

A: Using search engines to find exposed data.

55
New cards

Q: What is tailgating?

A: Following authorized users into secure areas.

56
New cards

Q: What is shoulder surfing?

A: Observing credentials being entered.