1.2 Given a scenario, analyze potential indicators to determine the type of attack. Flashcards

1
Q

class of ransomware that attempts to encrypt data files.

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

type of Trojan malware that tries to extort money from the victim.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

spawn browser pop-up windows, as well as modify DNS queries attempting to direct the user to other websites, often of dubious provenance.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

using a counterfeit card reader to capture card details, which can then program a duplicate.

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Password spraying

A

horizontal brute-force online attack. This means that the attacker chooses one or more common passwords (for example, “password” or 123456) and tries to use them in conjunction with multiple usernames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a worm

A

memory-resident viruses that replicate over network resources. The primary effect of a worm infestation is to rapidly consume network bandwidth as the worm replicates. A worm may also be able to perform a Denial of Service attack by crashing operating systems and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multipartite virus

A

uses both boot sector and executable file infection methods of propagation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

macro virus

A

uses the programming features available in Microsoft Office files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

program virus

A

sequences of code insert themselves into another executable program. When executing the application, the virus code becomes active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a PUP

A

Potentially unwanted programs (PUP) or potentially unwanted applications (PUA) is software installed alongside a package or from a computer store that the user did not request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojans

A

malware concealed within an installer package for software that appears to be legitimate. Unlike a PUP, a trojan is a real threat to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Viruses

A

malware that is not necessarily hidden and very noticeable by virus scanners. These usually come in the form of executables (.exe) or Dynamic-link Library (DLL) files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

allows remote control to a computer and allows the attacker to access the PC, upload files, and install software.

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly