1.2 Flashcards

(31 cards)

1
Q

A type of malware that encrypts a victim’s files or locks their computer, demanding payment in exchange for restoring access

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of malware that disguises itself as legitimate software to trick victims into downloading and installing it, allowing attackers to gain unauthorized access to their system

A

TROJAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A self-replicating type of malware that spreads through networks, often causing damage to computer systems

A

WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software that is installed without the user’s consent, typically with the purpose of displaying ads or collecting data

A

pup POTENTIALLY UNWATNTED PROGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of malware that operates entirely in computer memory without writing any files to disk, making it difficult to detect and remove

A

fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A mechanism used by attackers to communicate with malware-infected devices and control their behavior

A

Command and control (C&C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

type of automated cyber attack, where software programs perform malicious activities such as sending spam emails, scraping data, launching DDoS attacks, and brute-forcing passwords.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of malware that remains dormant until triggered by a specific event or condition, often causing damage to computer systems

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware that secretly collects information from a victim’s device and sends it to attackers

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of spyware that captures keystrokes made by a victim, allowing attackers to steal sensitive information such as passwords

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of trojan that allows attackers to remotely control a victim’s device, often used for spying or stealing data

A

RAT (Remote Access Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware that hides its presence and activity on a victim’s device, making it difficult to detect and remove

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hidden entry point in software or devices that allows attackers to bypass normal security measures and gain unauthorized access

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A brute-force password attack in which attackers try a small number of commonly-used passwords against a large number of user accounts

A

Spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A brute-force password attack in which attackers use a list of commonly-used passwords to try to gain access to a victim’s account

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A brute-force password attack in which attackers use a list of commonly-used passwords to try to gain access to a victim’s account

A

Dictionary Attack

17
Q

A password attack in which attackers try every possible combination of characters until they find the correct password

A

Brute Force Attack

18
Q

A password attack in which attackers use precomputed tables of hashes to quickly crack passwords

A

Rainbow Table Attack

19
Q

Data that is not encrypted and can be read by anyone who has access to it, making it vulnerable to interception and theft.

A

Plaintext/unencrypted

20
Q

A type of hardware attack that involves a USB cable that is modified to include additional hardware or software to carry out malicious activities, such as stealing data or installing malware

A

Malicious Universal Serial Bus (USB) Cable

21
Q

A type of hardware attack that involves a flash drive that is loaded with malware and left in a public place for victims to pick up and use, potentially infecting their computer

A

Malicious Flash Drive

22
Q

A type of attack that involves stealing credit card information and creating a duplicate card to make fraudulent purchases

23
Q

A type of attack that involves stealing credit card information using a small device that is attached to a legitimate card reader, often found in public places such as ATMs or gas pumps

24
Q

A type of attack that involves manipulating or poisoning the data used to train machine learning algorithms, causing the algorithms to make incorrect predictions or decisions

A

Tainted Training Data for Machine Learning

25
Concerns around the security of machine learning algorithms, including their vulnerability to adversarial attacks and the potential misuse of algorithms for malicious purposes
Security of Machine Learning Algorithms
26
A type of attack that targets the software or hardware supply chain, infecting products before they reach the end user and potentially compromising a large number of devices
Supply Chain Attacks
27
Different types of attacks that target cloud-based systems (such as cloud storage or cloud applications) versus on-premise systems (such as traditional data centers)
Cloud-based vs On-Premise Attacks
28
Different types of attacks that target cryptographic systems, including the birthday attack (finding a collision in a hash function), collision attack (finding two different inputs that produce the same hash value), and downgrade attack (downgrading a security protocol to a weaker version).
Cryptographic Attacks - Birthday, Collision, Downgrade
29
s a type of cryptographic attack that exploits the probability of collisions between random numbers. The attacker calculates a large number of hash values for different inputs and stores them in a table to find two inputs that produce the same hash value.
birthday attack
30
type of cryptographic attack that aims to find two different input values that produce the same hash value.
collision attack
31
what is a c2 server
comman and control server