1.2 Analyze potential indicators to determine the type of attack Flashcards

1
Q

Any element of software that performs an unwanted function from the perspective of the legitimate user or owner of a computer system.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A form of malware that takes over a computer system, usually by encrypting user data, to hinder its use while demanding payment.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A means of delivering malicious software by disguising it inside of something useful or legitimate.

A

Trojans (Trojan Horse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware designed to exploit a specific vulnerability in a system and then use that flaw to replicate themselves to other systems. They typically focus on replication and distribution, rather than on direct damage and destruction.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any type of questionable software that is not specifically malware but is still otherwise unwanted on a typical computer system.

A

Potentially Unwanted Programs (PUPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of malware that resides in the memory only and does not save itself to the local storage devices

A

Fileless Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An intermediary communication service often used by botnets.

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The infection agents that make up a botnet.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network of systems infected by malicious software agents controlled by a hacker to launch massive attacks against targets.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A form of malware that uses the system resources of an infected computer to mine cryptocurrencies.

A

Cryptomalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A form of malicious code that remains dormant until a triggering event or condition occurs.

A

Logic Bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any form of malicious code or even business or commercial code that collects information about users without their direct knowledge or permission.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A form of unwanted software that records the keystrokes typed into a system’s keyboard.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A form of malicious code that grants an attacker some level of remote-control access to a compromised system.

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A special type of hacker tool that embeds itself deep within an operating system, where it can manipulate information seen by the OS and displayed to users.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A developer installed access method bypasses any and all security restrictions, or a hacker installed remote=access client.

A

Backdoor

17
Q

Seeks to reverse engineer password hashed through attacks such as: Brute force(birthday attack), dictionary, hybrid and rainbow table attacks.

A

Password Attacks

18
Q

The attempt to log into a user account through repeated attempts of submitting generated or pulled-from-a-list credentials.

A

Spraying (Stuffing)

19
Q

An attack that that performs password guessing by using a preexisting or precompiled list of possible passwords.

A

Dictionary Attack

20
Q

An attack that tries every valid combination of characters to construct possible passwords

A

Brute Force Attack (Birthday Attack)

21
Q

An attack where the attacker is working on their own independent computers to compromise a password hash.

A

Offline Brute Force

22
Q

An attack that occurs against a live logon prompt.

A

Online Brute Force

23
Q

A tool that takes advantage of a concept know as a hash chain. Relatively fast password cracking is achieved at the expense of spending the time and effort beforehand to craft the table hash chain database.

A

Rainbow Tables

24
Q

When online occurs against a live logon prompt. When offline this attack is one where the attacker is working on their own independent computers to compromise the hash.

A

Password attacks/cracking (online/offline)

Plaintext/unencrypted

25
Q

Includes attempts to gain access into a facility, damage a facility, steal equipment, damage equipment, plant software or listening devices, clone data, and physically harm personnel.

A

Physical attacks

26
Q

A device crafted to perform unwanted activities against a computer and/or mobile device or peripheral without the victim realizing the attack is occurring. Attacks include exfiltration of data and injecting malware.

A

Malicious universal serial bus cables (USB) /flash drives

27
Q

The duplication of data from a targeted source card onto a blank new card.

A

Card cloning (skimming)

28
Q

A training or programming technique where computational systems are set up to operate in opposition to automate the process of developing system defenses and attacks.

A

Adversarial AI (AAI)/Adversarial ML(AML)

29
Q

Attacks that could result in flawed or less reliable products or could allow for remote access or listening mechanisms to be embedded into otherwise functioning equipment.

A

Supply Chain Attacks

30
Q

Used against hashing and other forms of cryptography involving finite sets (of either hashes or keys).

A

Birthday attacks (crypt attack)

31
Q

When the output of two cryptography operations produces the same result.

A

Collision attacks (crypt attack)

32
Q

Attempts to prevent a client from successfully negotiating robust high-grade encryption with a server.

A

Downgrade attacks (crypt attack)

33
Q

Malicious code that displays pop-ups or alternate advertisements to users based on their activities, URLs they have visited, applications they have accessed, and so on.

A

Adware (crypt attack)

34
Q

Attacks that are more likely a matter of opportunity, in that the attacker found a flaw in a online service and your account just happened to be hit in the process.

A

Cloud based attacks

35
Q

Attacks intentionally focused on your organization.

A

On premises attacks