sec+ 601 Flashcards

1
Q

Someone who is pretending to be someone to gain trust is

A

impersonator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When an attacker tries to exploit your email to gain acces creditiditals

A

Phishing- email they try and gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is it called when the attacker changes the URL?

A

Typosquatting, prepend is the beggining being changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When the e-mail lies to yout to exploit emotions to click on the phising email.

A

Pre-text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

when attacker wants to take over a large group in phising

A

pharmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when clicking on the email and it takes you to another website that copies everything you type in.

A

redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attack ove rthe voice line it looks like a locoal phone number is calling but its not

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attacker entice you ckick a link through a text messga

A

smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

gather info on victim from social media linked in etc. to make up a pretext

A

reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an attack with inside information to make it more believable

A

targeted phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

spear fishing the CEO is also called

A

whaling it targets someone like a CFO who has all credited or valuable credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

often seen with vishing attackers will extract information from the victim

A

eliciting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

throwing away mail or any personal information in the trash attackers who do this can find it

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

people can look over your shoulder peaking with their eyes to see the information on the screen

A

shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a threat that doesn’t actually exist, but seem like they could be ex: needing to update software after typing to the wrong URL

A

hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

infect a third party site to victimize all its visit that visit the site

A

watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

layered defense helps what attack firewalls and IPS anti-virus/anti-malware signature updates

A

watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unsolicited messages emails forums can contain phishing attempt

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what helps filter spam before it goes to the internal server

A

mail gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

checks the ip address and makes sure its trusted if not it blocks the ip addres

A

reverse DNS rDNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

slows down the mail server to take a lot of time and also slows down their server

A

tarpitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

blcoks all recipent that are not

A

reciepient filerting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

sway the way people are thinking

A

hacking public campaign

24
Q

miltatry using the inteernt to sway

A

hybrid warfare

25
when someone follows you inside righ after you walk in the door blending in with the crowd
tailgating
26
attacker sneds an invoce for products you are using in teh organization
invoice scams
27
attackers collecting login credentials mayb run a macro that downlaods all crednetials
credential harvest
28
Malicious software that can gathers keystrokes, controls your computer by third-party and control the whole system.
Malware think of malicious + software= malware
29
Malware can encrypt your data t/f
true
30
Malware comes in e-mails, advertisements, webpages to download software t/f
true
31
malware that can reproduce itself but needs user to click on something
virus
32
worms can jump from machine to machine with out any human intervention
True
33
anti-virus will prevent what
Viruses
34
a type of cirus that is part of an application
program viru s
35
all you have to do is start the OS and the virus will start
boot sector
36
may act as a script on the OS
scritp virus
37
a virus that is runnning inside another application
macor virus
38
a virus that never installs or saves itself as visur son the file stem to avoid being known.
fileless virus
39
What virus operates in the memory of the computer? Nothing is ever written on the storage drive
Fileless Virus
40
what virus runs PowerShell scripts
Fileless scripts
41
what virus connects to local systems or networks and multiply
worms
42
what virus takes advantage of vulnerability OS or applications
worms
43
firewalls and or IDS/IPS helps mitigate what virus
worms they help block the communication
44
installs malware to encrypt data and then wants crypto currency in exchange
crypto-malware
45
taking away data and required to pay for it back
ransomware
46
using a back-up, updating your OS,applications and antivirus-anti-malware will help prevnt ransom and cryptoware
True
47
software that pretends to be something else. doesn't really replicate only ends up installing malware
Trojan horse
48
overly aggressive browser toolbar
Potentially unwanted program PUP
49
installs new software for a new way to enter the sytem often placed with malware
backdoor
50
remote adminstration tool is also called what
Remote access Trojan RAT
51
RATs conrols a device key logg screen record take screen shots copy files and embed more malware
true
52
how to prevent agaisnt trojan and rats
dont run unkown software keep anti-virus and anti-,alwre up to date always have a back up
53
What modifes parts of the kernal aka the foundational buldings blocks of the OS
Rootkits
54
rootskits can be found on all operating devices
true
55
what is an example of kernal drivers
Zeus/Zbot