Common Threats and Vulnerabilities Flashcards

(29 cards)

1
Q

_________is malicious software used by threat actors to compromise target computers for harmful purposes.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a type of malware used to secretly gather data on a target computer and send it back to threat actors.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is a collection of malware tools that can be used by threat actors to remotely access and control target computers.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a type of malware that is used by threat actors to encrypt the hard drive content of a target computer.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a type of malware that redirects the browser on target computers to various predetermined websites chosen by threat actors.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a type of malware used by thread actors on target computers to take over computer resources for the purposes of mining.

A

Cryptojacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A self propagating malicious code that can propagate to other systems on the network and consume resources that could lead to a denial of service attack is called a_________.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer malware code that replicates itself on the target computer and spreads through the network, causing damage and distributing additional harmful payloads is called a ______.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A program that appears to be useful or harmless, but contains hidden code that can compromise the target system on which it runs is called a _______

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attack occurs when threat actors utilize botnets on several computers to overwhelm our targeted web server?

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false? Following a “clear screen” policy means that you keep your computer in a locked state when you are away from your desk.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Thread actors send emails randomly to a very large number of recipients with the intent to gather information or fraud for identity theft.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat actors send emails that are carefully designed to get a single recipient within an organization to respond and unknowingly, install malware onto their system.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat actors create fraudulent text messages to try to lure victims into revealing account information or installing malware.

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat actors use voice calls to manipulate an individual into releasing confidential data.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of attack intercepts and alters data sent between two hosts?

A

Man-in-the-middle

17
Q

What is spyware?

A

A program that collects information about users, systems, and browsing habits.

18
Q

What is the term for a collection of software tools used by an attacker to obtain administrator level access to a computer?

19
Q

What attack method requires the use of a phone to obtain personal or sensitive information?

20
Q

Which type of cyber attack includes fishing, tailgating, and shoulder surfing?

A

Social engineering

21
Q

Which social engineering attack targets high ranking individuals in order to compromise personal or sensitive data?

22
Q

Which type of physical attack involves entry into a restricted building or area?

23
Q

What type of attack is directed toward a specific group of users to trick them into visiting an infected website?

A

Watering hole

24
Q

You discover malware that has been collecting data and forwarding it to another server in a different country. For several months, what type of attack is this?

A

Advanced persistent threat

25
What is a common type of attack launched under IoT devices?
DDoS attack
26
True or false? Advanced persistent threat (ATP) attacks are used to steal data?
True
27
An employee steals confidential technical specifications for a product for personal gain.
Malicious insider
28
An employee takes home a storage drive without authorization, which is then stolen from the employee's vehicle.
Negligent insider
29
An employee gives their credentials to an attacker and a spear fishing attack, and the attacker uses the credentials to launch further attacks.
Compromise insider