1.2 Given a scenario, analyze potential indicators to determine the type of attack. Flashcards

1
Q

Malware

A

Malware or malicious code is any element of software that performs an unwanted function from the perspective of the legitimate user or owner of a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

Ransomware is a form of malware that takes over a computer

system, usually by encrypting user data, to hinder its use while demanding payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan

A

A Trojan or Trojan horse is a means of delivering malicious software
by disguising inside of something useful or legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms

A

Worms are designed to exploit a specific vulnerability in a system and
then use that flaw to replicate themselves to other systems. Worms typically focus on replication and distribution, rather than on direct damage and destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PUPs

A

Potentially unwanted programs (PUPs) are any type of questionable
software. Anything that is not specifically malware but still otherwise unwanted on a typcal computer system could be considered a PUP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File less virus

A

Fileless viruses reside in memory only and do not save themselves to the local storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

command and control.

A

Command and control (C&C) is an intermediary

communication service often used by botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bots and Botnets

A

Bots are the infection agents that make up a botnet. A botnet is a network of systems infected by malicious software agents controlled by a hacker to
launch massive attacks against targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptomalware

A

Cryptomalware is a form of malware that uses the system

resources of an infected computer to mine cryptocurrencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logic Bombs

A

A logic bomb is a form of malicious code that remains dormant
until a triggering event or condition occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Spyware is any form of malicious code or even business or
commercial code that collects information about users without their direct knowledge or
permission.
Understand adwa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adware

A

Adware displays pop-up or alternate advertisements to users based
on their activities, URLs they have visited, applications they have accessed, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keylogger

A

A keylogger is a form of unwanted software that records the keystrokes typed into a system’s keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAT

A

A remote-access Trojan (RAT) is a form of malicious code that grants
an attacker some level of remote-control access to a compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkits

A

A rootkit is a special type of hacker tool that embeds itself deep
within an operating system (OS), where it can manipulate information seen by the OS and
displayed to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Backdoor Attacks

A

There are two types of backdoor attacks: a developer installed access method that bypasses any and all security restrictions, or a hacker-installed
remote-access client.

17
Q

Password Attacks

A

Password attacks are collectively known as password
cracking or password guessing. Forms of password attacks include brute force (also known
as a birthday attack), dictionary, hybrid, and rainbow tables.

18
Q

Spraying and Stuffing

A

Spraying or stuffing of passwords/credentials is the
attempt to log into a user account through repeated attempts of submitting generated or
pulled-from-a-list credentials.

19
Q

Dictionary Attacks.

A

dictionary attack performs password guessing by using

a preexisting or precompiled list of possible passwords.

20
Q

brute-force attacks

A

A brute-force attack tries every valid combination of

characters to construct possible passwords.

21
Q

Understand online vs. offline password cracking

A

An online password attack occurs
against a live logon prompt. An offline attack is one where the attacker is working on their
own independent computers to compromise a password hash.

22
Q

Rainbow Tables.

A

Rainbow tables take advantage of a concept known as a hash
chain. It offers relatively fast password cracking, but at the expense of spending the time
and effort beforehand to craft the rainbow table hash chain database.

23
Q

malicious USB cables and flash drives

A

A malicious universal serial bus (USB)
cable or flash drive is a device crafted to perform unwanted activities against a computer
and/or mobile device or peripheral without the victim realizing the attack is occurring.
Attacks include exfiltrating data and injecting malware.

24
Q

Card cloning and skimming

A

Card cloning is the duplication of data

(skimming) from a targeted source card onto a blank new card.

25
Q

Adversarial AI.

A
Adversarial artificial intelligence (AI) (AAI) or adversarial 
machine learning (ML) (AML) is a training or programming technique where computational systems are set up to operate in opposition to automate the process of developing 
system defenses and attacks. This is also called a generative adversarial network (GAN)
26
Q

supply-chain attacks

A

Supply chain attacks could result in flawed or less reliable products or could allow for remote access or listening mechanisms to be embedding
into otherwise functioning equipment.