1.2 Given a scenario, analyze potential indicators to determine the type of attack Flashcards

1
Q

Back Door

A

UNDOCUMENTED undocumented command sequences that allow individuals with knowledge of the back door to BYPASS normal access restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rootkit

A

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crypto-malware

A

Ransomware that encrypts files stored on a computer or mobile device in order
to extort money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hoaxes

A

are a nuisance that result in wasted resources. Used to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logic Bombs

A

are malicious code objects that infect a system and lie dormant until they are triggered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan Horse

A

a software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worm

A

Malware that makes copies of it self without human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PUP

A

Potineally unwanted programs
Programs that may be a unwanted program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keylogger

A

Logs/copies key strokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Malware used to obtain information on a person, system, or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fileless Virus

A

malious code that resides in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command Control

A

a computer CONTROLLED BY AN ATTACKER or cybercriminal which is used to send
commands to systems compromised by malware and receive stolen data
from a target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAT

A

remote access trojan
Malware program that gives an intruder ADMIN access over a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Attacker locks the users files, then request a a ransom to unlock them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionary Attacks

A

Attacker uses common/dictionary words too obtain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Spraying

A

Attacker tries a password against many different accounts to avoid lockouts

17
Q

Offline Attacks

A

A attempt to discover a password form a captured DATA BASE or packet SCAN

18
Q

Online Attacks

A

Attempts to discover a password from an online system. For

19
Q

Plaintext/Unencrypted

A

Protocols and authentication methods that leave credentials unencrypted,

20
Q

Brute Force

A

Attempts to randomly find the correct cryptographic key attempting all possible combinations

21
Q

Rainbow Tables

A

A table of passwords that a attacker can try makes BRUTE FORCE ATTCAK more effective

22
Q

Salts

A

Random data added to password at the end to encrypt a HASH

23
Q

Botnet

A

A collection of compromised computing devices called a BOT OF ZOMBIES

24
Q

Malicious Flash Drive

A

Flash drive that has some form of malware

25
Malicious USB Cable
26
Card Cloning
Focuses on capturing info from cards used for access, like RFID and magnetic stripe cards.
27
Skimming
Fake card readers that capture the info of the card to apply them to fake cards
28
Supply Chain Attacks
Often attempt to compromise devices, systems, or software before it reaches an organization.
29
Collision Attack
When two hashes have the same hash value
30
Downgrade Attack
When downgrading the versions of security
31
Replay Attack
an attempt to reuse authentication requests.