Chapter 6

  1. What is an APT?
    Advanced Persistent Threat
  2. What is a virus?
    malicious code that attaches itself to a host application. The host application must be executed to run and the malicious code executes when the host application is executed.
  3. What is a worm?
    • A self-replicating malware tha ttravels throughout a network without the assistance of a host application or user interaction.
    • A worm resides in memory and can use different transport protocols to travel over the network.
  4. What is Rogueware?
    • A trojan method that has become popular in recent years, also known as scareware.
    • Rogueware masquerades as a free antivirus program.
  5. What is Doxing?
    A blackmail technique in ransomware that threatens to publish the encrypted files if the user does not pay.
  6. What is mirai?
    A malware that turns networked devices running linux into remotely controlled bots to be part of a botnet.
  7. What is a rootkit?
    • a group of programs that hides the fact that the system has been infected or compromised by malicious code.
    • In additional to modifying internal OS processess, rootkits often modify system files such as the Registry.
  8. what is hooking?
    hooking refers to when a rootkit intercepts system-level function calls, events, or messages. The rootkit installs ht ehooks into memory and uses them to control the system's behavior.
  9. What is the 419 scam?
    A classig Nigerian scam where you receive an email from someone claiming a relative or someone else has millions of dollars.
  10. What is whaling?
    A form of spear phishing that attempts to target high-level executives.
  11. What is DEP?
    Data execution prevention (DEP) is a security feature that prevents code from executing in memory regions marked as nonexecutible. Main purpose of DEP is to protect a system from malware.
  12. What does AMP stand for?
    Advanced Malware Protection
Card Set
Chapter 6
Chapter 6