1.2 Flashcards

1
Q

The main difference between a virus and a worm.

A

A virus needs human interaction to duplicate, whereas a worm does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a worm duplicate itself?

A

Through the computer’s file systems or the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A virus that never installs itself nor saves itself onto the file sytem

A

Fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where does a fileless virus operate?

A

Within the computers memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 2 things help mitigate worm infestations?W

A

Firewalls and IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When an attacker captures a victim’s data and forces the victim to pay money to receive it back.W

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When an attacker captures and encrypts your data

A

Cryptomalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The most obvious way to protect against malware

A

Have an offline backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software/Malware that pretends to be something else

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that is installed through malware that may slow down computer performance or plainly be annoying

A

PUP (Potentially Unwanted Program)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A way for malware to easily reconnect to an infected system once initially installed

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Known as the ultimate backdoor, this gives a third party administrative control over a device

A

RAT (Remote Administration Tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This malware modifies the core system files - it can become invisible

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This booting sequence checks to see if any part of the kernel has been changed, and if so, it will not boot that part.

A

Secure boot with UEFI BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware that spies on a user’s interaction with their computer

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your system becomes this once the attacker gains control of your system through malware.

A

Bot

17
Q

Controls the bots of a botnet

A

Command and Control (server)

18
Q

Type of attack that occurs when a separate event is triggered.

A

Logic bomb

19
Q

The using of common passwords in hopes to infiltrate a user’s account, but not enough times to lock the account.

A

Spraying attack

20
Q

Using every combination of letters, numbers, and special characters until the password is cracked.

A

Online Brute Force

21
Q

Known as the process of obtaining the list of users and hashes, calculating a password has and comparing it to a stored hash.

A

Offline Brute Force

22
Q

Cracking a password using common words related to a language or line of work.

A

Dictionary

23
Q

Known as an optimized, pre-built set of hashes that contains pre-calculated hash chains

A

Rainbow tables

24
Q

Passwords that are stored in unencrypted location

A

Plaintext