Security: Identify common security threats and vulnerabilities Flashcards

1
Q

An email request pretending to be from a financial institution asking for your login information is an example of what?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of malicious software infects through the internet to collect user information, including browsing habits?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which security threat often uses tracking cookies to collect and report a user’s activities?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which activity is covered under the confidentiality objective of the CIA triad and involves examining someone’s computer to steal confidential information?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is when someone piggybacks on your credentials to gain unauthorized entry into a building

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______ occur when live environments become vulnerable and targeted before a fix or patch can be implemented. Occurs when security is breached on the same day an application is released

A

Zero day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ occurs when a group of users in an organization become a high risk or target for attacks through email and social media posts.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ is like spear phishing but aimed at senior executives

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A hacker learns an employee’s user name and password by impersonating tech support. What type of attack is this?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some common ways a virus infection occurs on a computer?

A
  • Through the internet
  • Through email
  • Through file sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Several employees report their emails were hacked after going to a coffee shop and using their phones there. What kind of attack is this most likely?

A

Shoulder surfing

Do not enter private data or log in information where someone can see it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What malicious program replicates itself to computers on a network through security loopholes?

A

Worm

A worm infects a computer by detecting various vulnerabilities, after the computer is infected, the worm attempts to replicate itself by detecting similar vulnerabilities on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What malicious software relies on other applications to execute and infect the system?

A

Virus

The main criterion for classifying a virus is that it spreads via host applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a logic bomb and a time bomb?

A

A time bomb occurs on a specified date or time.

A logic bomb occurs when a certain condition is met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ attacks involve attempting to crack encrypted passwords by using the same algorithms in the dictionary file used to encrypt a user’s password

A

Dictionary

17
Q

What is a rootkit?

A

A collection of programs that grants a hacker administrative access to a computer or network

18
Q

_____ occurs when an email header is used to make a message look like it came from a valid source

A

Email spoofing