Domain 1.0 Threats, Attacks, and Vulnerabilities Flashcards

1
Q

worm

A

a memory- resident malware that run without user intervention and replicate over network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

fileless malware

A

does write its code to disk. It uses memory resident techniques to run its own process, within a host process or dynamic link library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

dynamic link library

A

a collection of small programs that larger programs can load when needed to complete specific tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

shellcode

A

lightweight block of malicious code that exploits a software vulnerability to gain initial access to a victim system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“live off the land” malware

A

malware may use legitimate system scripting tools, notably PowerShell and Windows Management Instrumentation (WMI) to execute payload actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

advance persistent threat (APT) and advanced volatile threat (AVT)

A

describe class of modern filess/live off the land malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Low Observable Characteristics (LOC) attack

A

a type of stealth attack that evades detection by most security solutions and impacts forensic analysis efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

backdoor

A

any type of access method to a host that circumvents the usual authentication method and gives the remotes user administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Remote Access Trojan or Remote Administration Tool (RAT)

A

a backdoor malware that mimics the functionality of legitimate remote control programs but is designed specifically to operate covertly
A host that is under control by a RAT is called a zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

command and control (C2 or C&C)

A

an infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

covert channel

A

a type of attack that subverts network security systems and policies to transfer data without authorization or detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet relay chat (IRC)

A

a group communication protocol that enables users to chat, send private messages, and share files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

rootkit

A

a class of malware that modifies system files, often at the kernel level to conceal its presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crypto-malware ransomeware

A

encrypts data files on any fixed, removable, and network drives
the user will be unable to access files without obtaining the private encryption key, held by the attacker
Cryptolocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

crypto-mining/cryptojacking

A

hijacks the resources of the host to perform cryptocurrency mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logic bomb

A

an event that triggers an undesirable event
the infected systems has a pre-configured time or date (time bomb) or system or user event
also called a mine

17
Q

endpoint protection platforms

A

a software agent and monitoring system that performs multiple security tasks

18
Q

user and entity behavior analytics (UEBA)

A

a system that can provide automated identification of suspicious activity by user accounts and computer hosts

19
Q

anomaly analysis

A

a network monitoring system that uses a baseline of acceptable outcomes or event patterns to identify events that fall outside the acceptable range

20
Q

sandbox

A

a system configured to be completely isolated from its host so that the malware cannot break out
Cuckoo

21
Q

abnormal process behavior

A

indicators that a legitimate OS process has been corrupted with malicious code for the purpose of damaging or compromising the system