1.2 Flashcards

1
Q

A type of malware that encrypts a victim’s files or locks their computer, demanding payment in exchange for restoring access

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of malware that disguises itself as legitimate software to trick victims into downloading and installing it, allowing attackers to gain unauthorized access to their system

A

TROJAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A self-replicating type of malware that spreads through networks, often causing damage to computer systems

A

WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software that is installed without the user’s consent, typically with the purpose of displaying ads or collecting data

A

pup POTENTIALLY UNWATNTED PROGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of malware that operates entirely in computer memory without writing any files to disk, making it difficult to detect and remove

A

fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A mechanism used by attackers to communicate with malware-infected devices and control their behavior

A

Command and control (C&C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

type of automated cyber attack, where software programs perform malicious activities such as sending spam emails, scraping data, launching DDoS attacks, and brute-forcing passwords.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of malware that remains dormant until triggered by a specific event or condition, often causing damage to computer systems

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware that secretly collects information from a victim’s device and sends it to attackers

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of spyware that captures keystrokes made by a victim, allowing attackers to steal sensitive information such as passwords

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of trojan that allows attackers to remotely control a victim’s device, often used for spying or stealing data

A

RAT (Remote Access Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware that hides its presence and activity on a victim’s device, making it difficult to detect and remove

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hidden entry point in software or devices that allows attackers to bypass normal security measures and gain unauthorized access

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A brute-force password attack in which attackers try a small number of commonly-used passwords against a large number of user accounts

A

Spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A brute-force password attack in which attackers use a list of commonly-used passwords to try to gain access to a victim’s account

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A brute-force password attack in which attackers use a list of commonly-used passwords to try to gain access to a victim’s account

A

Dictionary Attack

17
Q

A password attack in which attackers try every possible combination of characters until they find the correct password

A

Brute Force Attack

18
Q

A password attack in which attackers use precomputed tables of hashes to quickly crack passwords

A

Rainbow Table Attack

19
Q

Data that is not encrypted and can be read by anyone who has access to it, making it vulnerable to interception and theft.

A

Plaintext/unencrypted

20
Q

A type of hardware attack that involves a USB cable that is modified to include additional hardware or software to carry out malicious activities, such as stealing data or installing malware

A

Malicious Universal Serial Bus (USB) Cable

21
Q

A type of hardware attack that involves a flash drive that is loaded with malware and left in a public place for victims to pick up and use, potentially infecting their computer

A

Malicious Flash Drive

22
Q

A type of attack that involves stealing credit card information and creating a duplicate card to make fraudulent purchases

A

Card Cloning

23
Q

A type of attack that involves stealing credit card information using a small device that is attached to a legitimate card reader, often found in public places such as ATMs or gas pumps

A

Skimming

24
Q

A type of attack that involves manipulating or poisoning the data used to train machine learning algorithms, causing the algorithms to make incorrect predictions or decisions

A

Tainted Training Data for Machine Learning

25
Q

Concerns around the security of machine learning algorithms, including their vulnerability to adversarial attacks and the potential misuse of algorithms for malicious purposes

A

Security of Machine Learning Algorithms

26
Q

A type of attack that targets the software or hardware supply chain, infecting products before they reach the end user and potentially compromising a large number of devices

A

Supply Chain Attacks

27
Q

Different types of attacks that target cloud-based systems (such as cloud storage or cloud applications) versus on-premise systems (such as traditional data centers)

A

Cloud-based vs On-Premise Attacks

28
Q

Different types of attacks that target cryptographic systems, including the birthday attack (finding a collision in a hash function), collision attack (finding two different inputs that produce the same hash value), and downgrade attack (downgrading a security protocol to a weaker version).

A

Cryptographic Attacks - Birthday, Collision, Downgrade

29
Q

s a type of cryptographic attack that exploits the probability of collisions between random numbers. The attacker calculates a large number of hash values for different inputs and stores them in a table to find two inputs that produce the same hash value.

A

birthday attack

30
Q

type of cryptographic attack that aims to find two different input values that produce the same hash value.

A

collision attack

31
Q

what is a c2 server

A

comman and control server