4 Flashcards
(25 cards)
What is a PUP? (Select 3 answers)
* A type of computer program not explicitly classified as malware by AV software
* An application downloaded and installed without the user’s consent (illegal app)
* A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
* An application downloaded and installed with the user’s consent (legal app)
* A type of computer program explicitly classified as malware by AV applications
* A type of free, utility software often bundled with a paid app
- A type of computer program not explicitly classified as malware by AV software
- A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
- An application downloaded and installed with the user’s consent (legal app)
Which type of malware resides only in RAM?
* Rootkit
* Fileless virus
* Backdoor
* Logic bomb
Fileless virus
What is the function of a C2 server?
* Spam distribution
* Botnet control
* Authentication, Authorization, and Accounting (AAA)
* Penetration testing
Botnet control
A malware-infected network host under remote control of a hacker is commonly referred to as:
* Trojan
* Worm
* Bot
* Honeypot
Bot
Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?
* Botnet
* Intranet
* Honeynet
* Extranet
Botnet
Which of the following is an example of cryptomalware?
* Backdoor
* Ransomware
* Keylogger
* Rootkit
Ransomware
Malicious code activated by a specific event is called:
* Spyware
* Backdoor
* Rootkit
* Logic bomb
Logic bomb
Malicious software collecting information about users without their knowledge/consent is known as:
* Cryptomalware
* Adware
* Ransomware
* Spyware
Spyware
Which of the following is an example of spyware?
* Keylogger
* Vulnerability scanner
* Computer worm
* Packet sniffer
Keylogger
Which type of Trojan enables unauthorized remote access to a compromised system?
* pcap
* RAT
* MaaS
* pfSense
RAT
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
* Rootkit
* Spyware
* Backdoor
* Trojan
Rootkit
Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
* Logic bomb
* Trojan horse
* Rootkit
* Backdoor
Backdoor
A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
* Replay attack
* Dictionary attack
* Spraying attack
* Birthday attack
Spraying attack
Which password attack bypasses account-lockout policies?
* Birthday attack
* Spraying attack
* Dictionary attack
* Replay attack
Spraying attack
Which password attack takes advantage of a predefined list of words?
* Birthday attack
* Replay attack
* Dictionary attack
* Brute-force attack
Dictionary attack
One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline.
* True
* False
True
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as:
* Replay attack
* Brute-force attack
* Dictionary attack
* Birthday attack
Brute-force attack
Rainbow tables are lookup tables used to speed up the process of password guessing.
* True
* False
True
Which of the following refers to the contents of a rainbow table entry?
* Hash/Password
* IP address/Domain name
* Username/Password
* Account name/Hash
Hash/Password
In cryptography, the term “Plaintext” is used to describe data in an unencrypted form.
* True
* False
True
Due to added functionality in its plug, malicious USB cable can be used for:
* GPS tracking
* Capturing keystrokes
* Sending and receiving commands
* Delivering and executing malware
* Any of the above
- GPS tracking
- Capturing keystrokes
- Sending and receiving commands
- Delivering and executing malware
Which of the following terms is used to describe the theft of personal data from a payment card?
* Pivoting
* Skimming
* Phishing
* Bluejacking
Skimming
The practice of making an unauthorized copy of a payment card is referred to as:
* Rooting
* Cloning
* Replication
* Copying
Cloning
An AI feature that enables it to accomplish tasks based on training data without explicit human instructions is called:
* API
* ML
* RAD
* VR
ML