Chapter 2 Type of Attack Indicators Flashcards

1
Q

What does C.I.A stand for?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Malware?

A

Software that has been designed for some nefarious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Ransomware?

A

A form of malware that performs some action and extracts a ransom from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are trojans?

A

A piece of software that appears to do one thing but hides some other functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a worm?

A

Pieces of code that attempt to penetrate networks and computer systems, once infiltrated the worm will copy itself on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are potentially unwanted programs (PUP)?

A

Programs that may have adverse effects on a computer security or privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Fileless Viruses?

A

A piece of malware operating only in memory, never touching the filesystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a bot

A

A functioning piece of software that performs some task, under the control of another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a botnet?

A

A series of bots controlled across the network in a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Crypto-malware?

A

Malware that uses a systems resources to mine cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Logic Bombs

A

A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Spyware?

A

Software that spies on users, recording and reporting on their activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Keylogger?

A

A piece of software that logs all of the keystrokes that a user enters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Remote Access Trojans (RATS)?

A

A toolkit designed to provide the capability of covert surveillance and or the capability to gain unauthorized access to a target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Rootkit

A

A form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the five types of rootkits

A

firmware, virtual, kernel, library, and application level

17
Q

What are Backdoors

A

Programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system

18
Q

What is Password Spraying?

A

An attack that uses a limited number of commonly used passwords and applies them to a large number of accounts

19
Q

what is a dictionary attack?

A

When an attacker uses a list of dictionary words to attempt to crack a password

20
Q

What are Rainbow Tables?

A

Precomputed tables or hash values associated with passwords

21
Q

What is a salt?

A

a random set of characters designed to increase the length of the item being hashed

22
Q

What is Malicious Universal Serial Bus (USB) Cable?

A

A USB cable with embedded electronics in it

23
Q

What is Card Cloning?

A

When a hacker copies the magnetic strip of a credit card and makes a clone of it

24
Q

What are Skimming Devices?

A

Physical devices built to intercept a credit card

25
Q

What is Adversarial A.I.

A

A.I. designed to perform malicious attacks and evade detection

26
Q

What are cryptographic attacks?

A

Attacks against the cryptographic system

27
Q

What is a Downgrade attack?

A

An attack to downgrade the security to a lower or nonexistent state