1.2 Flashcards

1
Q

Malware

A

wide range of software that has malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

attackers take control of computers or networks locking out it’s users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptomalware

A

attackers encrypt the data on computers within a network to prevent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware and cryptoware attackers both demand

A

a ransom to be paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans

A

looks like something beneficial, but it’s actually something malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

self-replicating malware that travels throughout a network w/o the application of a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PUP (potentially unwanted programs)

A

programs that a user may not want, even if a user consented to download it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fileless virus

A

type of malicious software that runs in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command and Control

A

used to control infected computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bots

A

software robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bombs

A

left by an old employee or someone who has a grudge against an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

software installed on user’s systems w/o their awareness or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keyloggers

A

attempt to capture a user’s keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAT (remote access trojan)

A

malware that allows attackers to control systems from remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkit

A

group of programs that hides the fact that the system has been infected or compromised by malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Backdoor

A

another way of accessing a system and bypass normal authentication methods

17
Q

Password Attacks

A

attempt to discover, or bypass, passwords used for authentication on systems and files and for different types of files

18
Q

Online Password Attack

A

attempts to discover a password from an online system

19
Q

Offline Password Attack

A

attempt to discover passwords from a captured database/packet scan

20
Q

Brute Force Attacks

A

attempts to guess all possible character combos until username and passwords match

21
Q

Dictionary Attacks

A

uses dictionary words and attempts every word as the password to see if it works

22
Q

Spraying Attacks

A

an attacker will brute force logins based on list of usernames w/default passwords on the application

23
Q

Birthday Attacks

A

an attacker attempts to create a password that produces the same hash value as the user’s actual password

24
Q

Rainbow Table Attacks

A

type of attack that attempts to discover the password from a hash

25
Q

Salting

A

method of preventing rainbow table, brute force and dictionary attacks

26
Q

Plaintext/unencrypted Attacks

A

the attacker has knowledge of the plaintext and the corresponding ciphertext.

27
Q

Malicious Universal/Serial Bus (USB)

A

cable that has an embedded Wi-Fi controller capable of receiving commands from nearby wireless devices (smartphones)

28
Q

Malicious Flash Drive

A

one that includes malware configured to infect a computer when the drive is plugged in

29
Q

Card Cloning

A

making a copy of credit card using data captured from a magnetic strip

30
Q

Credit Card Skimming

A

capturing credit card data @ the time of sale

31
Q

Adversarial Artificial Intelligence

A

attempts to fool artificial intelligence (AI) models by supplying it w/deceptive input

32
Q

Tainted Data for Machine Learning (ML)

A

causes AI and ML systems to give inconsistent results.

33
Q

Supply-Chain Attacks

A

disruption in the supply-chain. 3rd party risks

34
Q

On-Premises

A

the organization retains complete control over all the cloud-based resources

35
Q

Off-Premises

A

CSP (cloud service provider) performs the maintenance, but an organization doesn’t know where the data is stored

36
Q

Collision Attack

A

when two different inputs creates the same hash value.

37
Q

Downgrade Attacks

A

forces a system to downgrade its security