Chapter 2- Type of Attack Indicators Flashcards

1
Q

Malware

A

harmful software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malware that can reproduce itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fileless virus

A

a piece of malware that operates only in the memory of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms

A

malware that self replicates and spreads quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A

a form of malware that locks the user out of their files or device until a payment is made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crypto-malware

A

uses cryptography to encrypt personal information until the victim sends the attacker crypto to decrypt your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan

A

software that pretends to be something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PUP (Potentially Unwanted Program)

A

undesirable software; unwanted software that can cause performance problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backdoors

A

malware that is used to create a new way to get into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote Access Trojans (RATs)

A

a remote access tool that gives a third party access to your computer remotely and has complete control over your OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkit

A

A set of software tools (malware)that enable an unauthorized user to gain control of a computer system without being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five types of rootkits?

A

firmware, virtual, kernel, library and application level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Malware that spies on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keyloggers

A

a piece of software that logs all of the keystrokes that a user enters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bot

A

is an automated software application that performs repetitive tasks over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Botnet

A

a series of bots that are controlled across the network in a group; a group of bots working together

17
Q

Logic Bomb

A

is a malicious piece of code that’s secretly inserted into a computer network, OS, or software application to cause harm.

18
Q

Password Spraying

A

is an attack that uses a limited number of commonly used passwords and applies to a large number of accounts

19
Q

Brute Force attack

A

when an attacker tries every possible password combination until a hash is matched.

20
Q

dictionary attack

A

an attack that use a list of dictionary words to try to guess the password

21
Q

offline brute force attack

A

an attack that can be employed to perform has comparisons against a stolen password file

22
Q

online brute force attack

A

an attack that tend to be very noisy and easy to see by network security monitoring and are also limited by system response time and bandwich

23
Q

Rainbow Tables

A

are precomputed tables or has values associated with passwords.

24
Q

Salt

A

Random data that is added to a password when hashing

25
Q

Malicious USB cable

A

Looks like a normal USB cable, but has additional electronics inside. Once connected, the table takes over.

26
Q

Malicious flash drive

A

Looks like a normal flash drive, but may have additional electronics inside that can cause harm to your system.

27
Q

Skimming

A

Stealing credit card information usually during a normal transaction.
Example: copy data from the magnetic strip: card number, expiration date, card holder’s name.

28
Q

ATM Skimming

A

Includes a small camera to also watch you insert your PIN

29
Q

Card Cloning

A

when the attacker makes a digital copy of the credit card information using a concealed or disguised electronic scanner.

30
Q

Artificial Intelligence (AI)

A

is the simulation of human intelligence processes by machines, especially computer systems.

31
Q

Machine Learning (ML)

A

Is a type of AI focused on building computer systems that learn from data, enabling software to improve its performance over time.

32
Q

Birthday attack

A

the attacker tries to find two different input messages that produce the same hash value, called a collision

33
Q

Cryptographic attack

A

You encrypted data and sent it to another person. The attacker doesn’t have the combination so they break the safe( the cryptography) and find other ways to undo the security

34
Q

Collision attack

A

Is where two different inputs field the same output of a hash function

35
Q

Downgrade attack

A

Instead of using perfectly good encryption, use something that’s not so great
-force the systems to downgrade their security

36
Q

Command and control

A

refers to methods and tools used to communicate with and control an infected machine or network.