☠️ Common Threat Types (Malware, Phishing, etc.) Flashcards

☠️ Common Threat Types (Malware, Phishing, etc.) (20 cards)

1
Q

What is malware?

A

Malicious software designed to damage, disrupt, or gain unauthorized access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus in cybersecurity?

A

A type of malware that attaches itself to files and spreads when the file is executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a worm differ from a virus?

A

A worm can replicate and spread independently without attaching to files or programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan horse in cybersecurity?

A

Malware disguised as legitimate software that tricks users into installing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware?

A

Malware that encrypts files and demands payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware?

A

Malware that secretly gathers user information without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a keylogger?

A

A type of spyware that records keystrokes to steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is adware?

A

Unwanted software that displays ads and may track user behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

A social engineering attack that tricks users into revealing personal or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does spear phishing differ from phishing?

A

It targets specific individuals or organizations using personalized information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is whaling in cybersecurity?

A

A phishing attack targeting high-profile individuals like executives (aka ‘big fish’).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a botnet?

A

A network of infected devices (bots) controlled remotely to perform coordinated attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a rootkit?

A

Malware designed to gain and hide privileged access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a zero-day attack?

A

An exploit that takes advantage of a previously unknown vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a man-in-the-middle (MITM) attack?

A

An attack where the attacker intercepts and possibly alters communications between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SQL injection?

A

A web attack where malicious SQL code is inserted into an input field to manipulate a database.

17
Q

What is DNS poisoning?

A

An attack that corrupts the DNS cache, redirecting users to malicious websites.

18
Q

What is a brute-force attack?

A

A trial-and-error method used to crack passwords by trying all possible combinations.

19
Q

What is social engineering?

A

The manipulation of people to gain confidential information or access.

20
Q

What is the purpose of a payload in a cyber attack?

A

It is the malicious part of an exploit that performs the harmful action, like deleting files or installing malware.