1.2 Analyze potential indicators to determine the type of attack Flashcards

1
Q

Malware
-Ransomware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware
-Trojans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware
-Worms

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware
-Potentially unwanted programs (PUPs)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware
-Fileless virus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware
-Command and control

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware
-Bots

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware
-Cryptomalware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware
-Logic bombs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware
-Spyware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware
-Keyloggers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware
-Remote access Trojan (RAT)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware
-Rootkit

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware
-Backdoor

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password attacks
-Spraying

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password attacks
-Dictionary

A
17
Q

Password attacks
-Bruteforce online/offline

A
18
Q

Password attacks
-Rainbow table

A
19
Q

Password attacks
-Plaintext/unencrypted

A
20
Q

Physical attacks
-Malicious Universal Serial Bus (USB) cable

A
21
Q

Physical attacks
-Malicious flash drive

A
22
Q

Physical attacks
-Card cloning

A
23
Q

Physical attacks
-Skimming

A
24
Q

Adversarial artificial intelligence (AI)
-Tainted training data for machine learning (ML)

A
25
Q

Adversarial artificial intelligence (AI)
-Security of machine learning algorithms

A
26
Q

Supply-chain attacks

A
27
Q

Could-based vs. on-premise attacks

A
28
Q

Cryptographic attacks
-Birthday

A
29
Q

Cryptographic attacks
-Collision

A