Methods of attack Flashcards

1
Q

Malware

A

A software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Malware that self-replicates, spreading across the network and infecting computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Malicious software installed on a user’s computer without their permission, which is used to spy on and steal user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whaling

A

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business email compromise (BEC)

A

An attack in which a threat actor impersonates a known source to obtain a financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social media phishing

A

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

An attack in which a threat actor compromises a website frequently visited by a specific group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly