2.4.1, 2.4.2, 2.4.3 Flashcards

1
Q

What is a Trojan horse in the context of cybersecurity?

A

Malicious software disguised as harmless or legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the significance of the term “Trojan Horse” in cybersecurity?

A

It symbolizes deceptive tactics used by hackers to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Trojan horses typically enter a victim’s computer?

A

Via email attachments or free downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What distinguishes a Trojan horse from a computer virus?

A

A trojan horse requires human assistance to propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a backdoor in the context of cybersecurity?

A

A mans to accessing a system or data bypassing normal security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Remote Access Trojan (RAT)?

A

A trojan horse with a backdoor allowing for remote control of the infected host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can a hacker do once a Remote Access Trojan (RAT) is installed on a victim’s computer?

A

Control the computer remotely and perform various actions such as viewing files and taking screenshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a Downloader Trojan?

A

To download and install additional malware onto an already infected computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a Distributed Denial of Service (DDoS) Trojan function?

A

By flooding a network with traffic from infected computers to overwhelm and disrupt its normal functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a recommended defense against Trojan horse attacks?

A

Regularly update antivirus and security software, and avoid downloading or running unknown or untrusted software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a characteristic of viruses?

A

They can self-replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the distinguishing feature of crypto-malware?

A

It utilizes CPU cycles to generate encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What differentiates ransomware from other forms of crypto-malware?

A

It holds victim’s information for ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary characteristic of trojan malware?

A

It utilizes authorized programs to subvert system defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What distinguishes worms from viruses?

A

They can self-replicate without relying on programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary function of spyware?

A

To listen to user activity without permission

17
Q

What are bloatware applications primarily used for?

A

To slow down devices and take up space

18
Q

What is the purpose of a keylogger?

A

To record user’s keystrokes to glean information

19
Q

What is the defining characteristic of bots in the context of malware?

A

They autonomously act on actions typically sent from a Command and Control center

20
Q

What is the primary function of a rootkit?

A

To gain administrative credentials on a system

21
Q

What is ransomware?

A

Malicious software that encrypt and locks a victim’s data and demands a ransom

22
Q

What type of data is commonly targeted by ransomware attackers?

A

Personal finance data

23
Q

Which term describes a version of ransomware that encrypts files but demands payment in cryptocurrency?

A

Cryptomalware

24
Q

How did the attackers demand payment from Baltimore City’s governmental computer systems in the RobbinHood ransomware attack?

A

Cryptocurrency (bitcoin)

25
Q

What is the best defense against ransomware according to the text?

A

Prevention and data backups

26
Q

What is scareware?

A

Software that creates fake antivirus alerts and demands payment

27
Q

What is the main reason ransomware is profitable for cybercriminals?

A

Victims often pay the ransom

28
Q

What is the purpose of doxware?

A

To threaten to release stolen data if a ransom is not paid

29
Q

What is one consequence of paying the ransom according to the text?

A

The cybercriminal releases the victim’s data publicly

30
Q

What is recommended to defend against ransomware attacks?

A

Regularly update software and keep backups of data