1.2 Given a scenario, analyze potential indicators to determine the type of attack Flashcards

1
Q

Back Door

A

UNDOCUMENTED undocumented command sequences that allow individuals with knowledge of the back door to BYPASS normal access restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rootkit

A

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crypto-malware

A

Ransomware that encrypts files stored on a computer or mobile device in order
to extort money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hoaxes

A

are a nuisance that result in wasted resources. Used to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logic Bombs

A

are malicious code objects that infect a system and lie dormant until they are triggered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan Horse

A

a software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worm

A

Malware that makes copies of it self without human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PUP

A

Potineally unwanted programs
Programs that may be a unwanted program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keylogger

A

Logs/copies key strokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Malware used to obtain information on a person, system, or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fileless Virus

A

malious code that resides in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command Control

A

a computer CONTROLLED BY AN ATTACKER or cybercriminal which is used to send
commands to systems compromised by malware and receive stolen data
from a target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAT

A

remote access trojan
Malware program that gives an intruder ADMIN access over a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Attacker locks the users files, then request a a ransom to unlock them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionary Attacks

A

Attacker uses common/dictionary words too obtain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Spraying

A

Attacker tries a password against many different accounts to avoid lockouts

17
Q

Offline Attacks

A

A attempt to discover a password form a captured DATA BASE or packet SCAN

18
Q

Online Attacks

A

Attempts to discover a password from an online system. For

19
Q

Plaintext/Unencrypted

A

Protocols and authentication methods that leave credentials unencrypted,

20
Q

Brute Force

A

Attempts to randomly find the correct cryptographic key attempting all possible combinations

21
Q

Rainbow Tables

A

A table of passwords that a attacker can try makes BRUTE FORCE ATTCAK more effective

22
Q

Salts

A

Random data added to password at the end to encrypt a HASH

23
Q

Botnet

A

A collection of compromised computing devices called a BOT OF ZOMBIES

24
Q

Malicious Flash Drive

A

Flash drive that has some form of malware

25
Q

Malicious USB Cable

A
26
Q

Card Cloning

A

Focuses on capturing info from cards used for
access, like RFID and magnetic stripe cards.

27
Q

Skimming

A

Fake card readers that capture the info of the card to apply them to fake cards

28
Q

Supply Chain Attacks

A

Often attempt to compromise devices, systems, or software before it reaches an organization.

29
Q

Collision Attack

A

When two hashes have the same hash value

30
Q

Downgrade Attack

A

When downgrading the versions of security

31
Q

Replay Attack

A

an attempt to reuse authentication requests.