Lesson 4 - Social Engineering & Malware Flashcards

1
Q

What is pharming?

A

Passive means of redirecting users from a legitimate website to a malicious one.

Relies on corrupting the way the victim’s computer performs name resolution, so they are redirected from the genuine site to the malicious one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which situation would require keyboard encryption software be installed on a computer?

A

Protect against spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hacker is able to install a keylogger on a user’s computer. What is the hacker attempting to do in this situation?

A

Steal confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is shellcode?

A

Fileless malware used to achieve a backdoor mechanism on the host.

Recompiled in an obfuscated form to evade detection by scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a script virus typically target?

A

Vulnerabilities in an interpreter; PDFs have become a popular vector for script viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus that attacks the disk boot sector information, the partition table, and sometimes the file system.

A

Boot Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Memory-resident malware that can run without user intervention and replicate over network resources.

A

Computer Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is spyware?

A

Malware that can perform adware-like tracking, but also monitor local application activity, take screenshots, and activate recording devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of administering cryptographic keys and managing their usage, storage, expiration, renewal, revocation, recovery, and escrow.

A

Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is characterized by its ability to hide itself by changing core system files and programming interfaces and to escalate privileges?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Actor registers a domain name that is very similar to a real one hoping users will not notice the difference.

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a “Watering Hole Attack”?

A

A passive technique that relies on a group of targets using an unsecure third-party website.

The threat actor does not have to risk communicating directly with the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly