2.4.1, 2.4.2, 2.4.3 Flashcards

1
Q

What is a Trojan horse in the context of cybersecurity?

A

Malicious software disguised as harmless or legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the significance of the term “Trojan Horse” in cybersecurity?

A

It symbolizes deceptive tactics used by hackers to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Trojan horses typically enter a victim’s computer?

A

Via email attachments or free downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What distinguishes a Trojan horse from a computer virus?

A

A trojan horse requires human assistance to propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a backdoor in the context of cybersecurity?

A

A mans to accessing a system or data bypassing normal security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Remote Access Trojan (RAT)?

A

A trojan horse with a backdoor allowing for remote control of the infected host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can a hacker do once a Remote Access Trojan (RAT) is installed on a victim’s computer?

A

Control the computer remotely and perform various actions such as viewing files and taking screenshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a Downloader Trojan?

A

To download and install additional malware onto an already infected computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a Distributed Denial of Service (DDoS) Trojan function?

A

By flooding a network with traffic from infected computers to overwhelm and disrupt its normal functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a recommended defense against Trojan horse attacks?

A

Regularly update antivirus and security software, and avoid downloading or running unknown or untrusted software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a characteristic of viruses?

A

They can self-replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the distinguishing feature of crypto-malware?

A

It utilizes CPU cycles to generate encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What differentiates ransomware from other forms of crypto-malware?

A

It holds victim’s information for ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary characteristic of trojan malware?

A

It utilizes authorized programs to subvert system defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What distinguishes worms from viruses?

A

They can self-replicate without relying on programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary function of spyware?

A

To listen to user activity without permission

17
Q

What are bloatware applications primarily used for?

A

To slow down devices and take up space

18
Q

What is the purpose of a keylogger?

A

To record user’s keystrokes to glean information

19
Q

What is the defining characteristic of bots in the context of malware?

A

They autonomously act on actions typically sent from a Command and Control center

20
Q

What is the primary function of a rootkit?

A

To gain administrative credentials on a system

21
Q

What is ransomware?

A

Malicious software that encrypt and locks a victim’s data and demands a ransom

22
Q

What type of data is commonly targeted by ransomware attackers?

A

Personal finance data

23
Q

Which term describes a version of ransomware that encrypts files but demands payment in cryptocurrency?

A

Cryptomalware

24
Q

How did the attackers demand payment from Baltimore City’s governmental computer systems in the RobbinHood ransomware attack?

A

Cryptocurrency (bitcoin)

25
What is the best defense against ransomware according to the text?
Prevention and data backups
26
What is scareware?
Software that creates fake antivirus alerts and demands payment
27
What is the main reason ransomware is profitable for cybercriminals?
Victims often pay the ransom
28
What is the purpose of doxware?
To threaten to release stolen data if a ransom is not paid
29
What is one consequence of paying the ransom according to the text?
The cybercriminal releases the victim’s data publicly
30
What is recommended to defend against ransomware attacks?
Regularly update software and keep backups of data