1.1 Flashcards

Threats, Attacks, and Vulnerabilities

1
Q

I am Malware that can reproduce. I am very common.

I need you to execute a program in order to spread throughout your system.

I can be invisible or I can be annoying

What am I?

A

I am a Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

I’m a virus apart of an application.

A

A Program Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

I’m a virus who needs an OS to run.

A

A Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

I’m a virus that can run on an operating system or a web browser

A

A Script Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

I’m a virus common in Microsoft Office and Excel

A

A Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

I am Malware that self replicates and spreads very quickly.

You don’t need to interact with me in order for me to spread throughout your network.

I actively search for vulnerabilities in systems on your network in order to infect them.

A

I am a Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I am malware that locks you out of your system.

I attempt to receive payment so that your system can be unlocked.

A security professional may be able to remove me.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

I maliciously encrypt your data.

You must pay in order to receive the decryption key.

I am a new form of ransomware

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does one protect against ransomware?

A

Offline backups
OS and application updates.
Anti Virus/Malware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I am software that pretends to be something else so that I can conquer your system.

I can slip by or disable your security measures for free reign of your system

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

I am a means of accessing a computer system via bypassing the system’s security mechanisms.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

I allow malicious users to control your system remotely.

I install on the host and provide the following capabilities:

  • Key-logging
  • Screen recording
  • Screenshots
  • File copy
  • Malware embedding
A

Remote Access Trojan (RATs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

I am malware that enable an unauthorized user to gain control of a computer system without being detected.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

I save all of your keyboard inputs and send them to malicious users remotely.

I also log your clipboard, screen, IM, and search engine inputs

I can bypass encryption protection.

A

Key Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

I am included with other software installations

I am frequently used to describe a form of malware which presents unwanted advertisements to the user of a computer

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

I am a type of malware that aims to gather information about a person or organization, without their knowledge,

I send such information to another entity without the consumer’s consent.

A

Spyware

17
Q

What is a bot?

A

A bot, short for “robot”, is a type of software application or script that performs automated tasks on command. Bad bots perform malicious tasks that allow an attacker to remotely take control over an affected computer

18
Q

I am a group of bots working together with malicious intent. ie. DDos attacks

A

Botnet

19
Q

I am a type of malware that waits for a specific event to occur before I unleash havoc on your system.

I am usually input by someone with system admin access.

ie. Deleting and removing your systemt

A

Logic Bomb

20
Q

What is a bot?

A

A bot, short for “robot”, is a type of software application or script that performs automated tasks on command. Bad bots perform malicious tasks that allow an attacker to remotely take control over an affected computer

21
Q

I am a group of bots working together with malicious intent. ie. DDos attacks

A

Botnet

22
Q

I am a type of malware that waits for a specific event to occur before I unleash havoc on your system.

I am usually input by someone with system admin access.

ie. Deleting and removing your systemt

A

Logic Bomb