Knowing Your Enemy Flashcards

1
Q

What are the two types of bugs/vulnerabilities

A

Known - Patch available
Unknown - Patch unavailable (Zero Days)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Macrovirus

A

A virus that’s released when a file is opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Polymorphic Virus

A

A virus that makes operational copies of itself with variations in its code
No parts identical between infections, hard to detect using signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Stealth Virus

A

A virus that intercepts antivirus requests to the OS and sends it incorrect information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Bot/Zombie

A

Compromised machine under control of attacker, can be added to a network of machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Worm?

A

A Virus that spreads to other machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an OS Rootkit?

A

Malware embedded into the kernel of the OS so its existence is hidden to the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Firmwire Rootkit?

A

Malware on the Firmware level
Even formatting drive or reinstalling OS won’t fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Trojan?

A

Program that appears to be one thing but is actually Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are RATs?

A

Remote Access Tools to control machine remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Ransomeware?

A

Malware that encrypts your files and then requests a ransom for the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Malvertisement?

A

Online advertisements that are infected with Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spyware?

A

Malware that can spy on your activity e.g. Camera, Microphone, Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the most popular techniques used in Phishing?

A

Hidden fake URLs
Covert URL redirect
- Link to real site, real site exploited
- Script injected into URL
IDN Homographs
Subdomains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the other versions of Phishing?

A

Vishing
- Phone or Voice
SMShing
- Text Messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Spam?

A

Any message that you didn’t request

17
Q

What is Doxing?

A

Gathering info on someone and using it to create a threat

18
Q

What is a Cryptojack?

A

A CPU Hijack where the computers processing power is used to mine crypto for the attacker

19
Q

Who are The Five Eyes

A

Australia
Canada
New Zealand
UK
USA