2 Flashcards
What is a PUP?
- A type of computer program not explicitly classified as malware by AV software
- A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
- An application downloaded and installed with the user’s consent (legal app)
Which type of malware resides only in RAM?
Fileless virus
What is the function of a C2 server?
Botnet control
A malware-infected network host under remote control of a hacker is commonly referred to as:
Bot
Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?
Botnet
Which of the following is an example of cryptomalware?
Ransomware
Malicious code activated by a specific event is called:
Logic bomb
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
Which of the following is an example of spyware?
Keylogger
Which type of Trojan enables unauthorized remote access to a compromised system?
** RAT **
Remote access trojans (RATs) give the attacker access to a variety of information on the infected device, including text messages, emails, contact lists, GPS location, camera feeds, and more.
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
** RootKit **
A rootkit is a malicious piece of software that’s designed to give admin control of the targeted system to an attacker while remaining hidden
Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
** Backdoor **
Backdoor Trojans are malicious software programs designed to grant unwanted access for a remote attack. Remote attackers can send commands or leverage full control over a compromised computer
A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
** Spraying attack **
A password spraying attack is a type of brute force attack where a hacker, much like the name implies, “sprays” an authentication server with combinations of usernames and common passwords. Attackers often run through lists of commonly used passwords available on the web.
Which password attack bypasses account-lockout policies?
** Spraying attack **
A password spraying attack is a type of brute force attack where a hacker, much like the name implies, “sprays” an authentication server with combinations of usernames and common passwords. Attackers often run through lists of commonly used passwords available on the web.
Which password attack takes advantage of a predefined list of words?
** Dictionary attack **
A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary as a password