Deck 6: Malicious Software

Full screen (f)
exit full mode
Question
The __________ is what the virus "does".

A)infection mechanism
B)trigger
C)logic bomb
D)payload
Use Space or
up arrow
down arrow
to flip the card.
Question
Programmers use backdoors to debug and test programs.
Question
A bot propagates itself and activates itself,whereas a worm is initially
controlled from some central facility.
Question
A Trojan horse is an apparently useful program containing hidden code that,
when invoked,performs some harmful function.
Question
A virus that attaches to an executable program can do anything that the
program is permitted to do.
Question
The term "computer virus" is attributed to __________.

A)Herman Hollerith
B)Fred Cohen
C)Charles Babbage
D)Albert Einstein
Question
A logic bomb is the event or condition that determines when the payload is
activated or delivered.
Question
Keyware captures keystrokes on a compromised system.
Question
Malicious software aims to trick users into revealing sensitive personal data.
Question
__________ are used to send large volumes of unwanted e-mail.

A)Rootkits
B)Spammer programs
C)Downloaders
D)Auto-rooter
Question
E-mail is a common method for spreading macro viruses.
Question
Packet sniffers are mostly used to retrieve sensitive information like
usernames and passwords.
Question
Computer viruses first appeared in the early __________.

A)1960s
B)1970s
C)1980s
D)1990s
Question
Metamorphic code is software that can be shipped unchanged to a
heterogeneous collection of platforms and execute with identical semantics.
Question
In addition to propagating,a worm usually carries some form of payload.
Question
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________.

A)Adobe
B)Animoto
C)malware
D)Prezi
Question
Many forms of infection can be blocked by denying normal users the right to
modify programs on the system.
Question
A macro virus infects executable portions of code.
Question
Every bot has a distinct IP address.
Question
A __________ is code inserted into malware that lies dormant until a predefined condition,which triggers an unauthorized act,is met.

A)logic bomb
B)trapdoor
C)worm
D)Trojan horse
Question
During the __________ phase the virus is activated to perform the function for which it was intended.
Question
__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information.

A)Trojan horse
B)Ransomware
C)Crimeware
D)Polymorphic
Question
During the __________ the virus is idle.

A)dormant phase
B)propagation phase
C)triggering phase
D)execution phase
Question
The ideal solution to the threat of malware is __________.

A)identification
B)removal
C)detection
D)prevention
Question
A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

A)spam
B)phishing
C)DDoS
C)sniff
Question
Sometimes referred to as the "infection vector",the __________ is the means by which a virus spreads or propagates.
Question
Unsolicited bulk e-mail is referred to as __________.

A)spam
B)propagating
C)phishing
D)crimeware
Question
__________ is the first function in the propagation phase for a network worm.

A)Propagating
B)Fingerprinting
B)Keylogging
D)Spear phishing
Question
A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent.
Question
A __________ is a collection of bots capable of acting in a coordinated manner.
Question
The __________ is when the virus function is performed.

A)dormant phase
B)propagation phase
C)triggering phase
D)execution phase
Question
__________ code refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
Question
The four phases of a typical virus are: dormant phase,triggering phase,execution phase and __________ phase.
Question
__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

A)Fingerprint-based scanners
B)Behavior-blocking software
C)Generic decryption technology
D)Heuristic scanners
Question
A computer __________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself.
Question
Sometimes known as a "logic bomb",the __________ is the event or condition that determines when the payload is activated or delivered.
Question
A __________ uses macro or scripting code,typically embedded in a document and triggered when the document is viewed or edited,to run and replicate itself into other such documents.

A)boot sector infector
B)file infector
C)macro virus
D)multipartite virus
Question
A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root)privileges while hiding evidence of its presence.
Question
A __________ virus is explicitly designed to hide itself from detection by anti-virus software.
Question
A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.
Question
Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.
Question
__________ technology is an anti-virus approach that enables the anti-virus program to easily detect even the most complex polymorphic viruses and other malware,while maintaining fast scanning speeds.
Question
Developed by IBM and refined by Symantec,the __________ provides a malware detection system that will automatically capture,analyze,add detection and shielding,or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere.
Question
A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Malicious Software
1
The __________ is what the virus "does".

A)infection mechanism
B)trigger
C)logic bomb
D)payload
D
2
Programmers use backdoors to debug and test programs.
True
3
A bot propagates itself and activates itself,whereas a worm is initially
controlled from some central facility.
False
4
A Trojan horse is an apparently useful program containing hidden code that,
when invoked,performs some harmful function.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
A virus that attaches to an executable program can do anything that the
program is permitted to do.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
The term "computer virus" is attributed to __________.

A)Herman Hollerith
B)Fred Cohen
C)Charles Babbage
D)Albert Einstein
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
A logic bomb is the event or condition that determines when the payload is
activated or delivered.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
Keyware captures keystrokes on a compromised system.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
Malicious software aims to trick users into revealing sensitive personal data.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
__________ are used to send large volumes of unwanted e-mail.

A)Rootkits
B)Spammer programs
C)Downloaders
D)Auto-rooter
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
E-mail is a common method for spreading macro viruses.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
Packet sniffers are mostly used to retrieve sensitive information like
usernames and passwords.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
Computer viruses first appeared in the early __________.

A)1960s
B)1970s
C)1980s
D)1990s
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
Metamorphic code is software that can be shipped unchanged to a
heterogeneous collection of platforms and execute with identical semantics.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
In addition to propagating,a worm usually carries some form of payload.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________.

A)Adobe
B)Animoto
C)malware
D)Prezi
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
Many forms of infection can be blocked by denying normal users the right to
modify programs on the system.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
A macro virus infects executable portions of code.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
Every bot has a distinct IP address.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
A __________ is code inserted into malware that lies dormant until a predefined condition,which triggers an unauthorized act,is met.

A)logic bomb
B)trapdoor
C)worm
D)Trojan horse
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
During the __________ phase the virus is activated to perform the function for which it was intended.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information.

A)Trojan horse
B)Ransomware
C)Crimeware
D)Polymorphic
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
During the __________ the virus is idle.

A)dormant phase
B)propagation phase
C)triggering phase
D)execution phase
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
The ideal solution to the threat of malware is __________.

A)identification
B)removal
C)detection
D)prevention
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

A)spam
B)phishing
C)DDoS
C)sniff
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
Sometimes referred to as the "infection vector",the __________ is the means by which a virus spreads or propagates.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
Unsolicited bulk e-mail is referred to as __________.

A)spam
B)propagating
C)phishing
D)crimeware
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
__________ is the first function in the propagation phase for a network worm.

A)Propagating
B)Fingerprinting
B)Keylogging
D)Spear phishing
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
A __________ is a collection of bots capable of acting in a coordinated manner.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
The __________ is when the virus function is performed.

A)dormant phase
B)propagation phase
C)triggering phase
D)execution phase
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
__________ code refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
The four phases of a typical virus are: dormant phase,triggering phase,execution phase and __________ phase.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

A)Fingerprint-based scanners
B)Behavior-blocking software
C)Generic decryption technology
D)Heuristic scanners
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
A computer __________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
Sometimes known as a "logic bomb",the __________ is the event or condition that determines when the payload is activated or delivered.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
A __________ uses macro or scripting code,typically embedded in a document and triggered when the document is viewed or edited,to run and replicate itself into other such documents.

A)boot sector infector
B)file infector
C)macro virus
D)multipartite virus
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root)privileges while hiding evidence of its presence.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
A __________ virus is explicitly designed to hide itself from detection by anti-virus software.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
__________ technology is an anti-virus approach that enables the anti-virus program to easily detect even the most complex polymorphic viruses and other malware,while maintaining fast scanning speeds.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
Developed by IBM and refined by Symantec,the __________ provides a malware detection system that will automatically capture,analyze,add detection and shielding,or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 44 flashcards in this deck.