4 Flashcards

1
Q

What is a PUP? (Select 3 answers)
* A type of computer program not explicitly classified as malware by AV software
* An application downloaded and installed without the user’s consent (illegal app)
* A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
* An application downloaded and installed with the user’s consent (legal app)
* A type of computer program explicitly classified as malware by AV applications
* A type of free, utility software often bundled with a paid app

A
  • A type of computer program not explicitly classified as malware by AV software
  • A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
  • An application downloaded and installed with the user’s consent (legal app)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of malware resides only in RAM?
* Rootkit
* Fileless virus
* Backdoor
* Logic bomb

A

Fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of a C2 server?
* Spam distribution
* Botnet control
* Authentication, Authorization, and Accounting (AAA)
* Penetration testing

A

Botnet control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A malware-infected network host under remote control of a hacker is commonly referred to as:
* Trojan
* Worm
* Bot
* Honeypot

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?
* Botnet
* Intranet
* Honeynet
* Extranet

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an example of cryptomalware?
* Backdoor
* Ransomware
* Keylogger
* Rootkit

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malicious code activated by a specific event is called:
* Spyware
* Backdoor
* Rootkit
* Logic bomb

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malicious software collecting information about users without their knowledge/consent is known as:
* Cryptomalware
* Adware
* Ransomware
* Spyware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an example of spyware?
* Keylogger
* Vulnerability scanner
* Computer worm
* Packet sniffer

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of Trojan enables unauthorized remote access to a compromised system?
* pcap
* RAT
* MaaS
* pfSense

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
* Rootkit
* Spyware
* Backdoor
* Trojan

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
* Logic bomb
* Trojan horse
* Rootkit
* Backdoor

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
* Replay attack
* Dictionary attack
* Spraying attack
* Birthday attack

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which password attack bypasses account-lockout policies?
* Birthday attack
* Spraying attack
* Dictionary attack
* Replay attack

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which password attack takes advantage of a predefined list of words?
* Birthday attack
* Replay attack
* Dictionary attack
* Brute-force attack

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline.
* True
* False

A

True

17
Q

An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as:
* Replay attack
* Brute-force attack
* Dictionary attack
* Birthday attack

A

Brute-force attack

18
Q

Rainbow tables are lookup tables used to speed up the process of password guessing.
* True
* False

A

True

19
Q

Which of the following refers to the contents of a rainbow table entry?
* Hash/Password
* IP address/Domain name
* Username/Password
* Account name/Hash

A

Hash/Password

20
Q

In cryptography, the term “Plaintext” is used to describe data in an unencrypted form.
* True
* False

A

True

21
Q

Due to added functionality in its plug, malicious USB cable can be used for:
* GPS tracking
* Capturing keystrokes
* Sending and receiving commands
* Delivering and executing malware
* Any of the above

A
  • GPS tracking
  • Capturing keystrokes
  • Sending and receiving commands
  • Delivering and executing malware
22
Q

Which of the following terms is used to describe the theft of personal data from a payment card?
* Pivoting
* Skimming
* Phishing
* Bluejacking

A

Skimming

23
Q

The practice of making an unauthorized copy of a payment card is referred to as:
* Rooting
* Cloning
* Replication
* Copying

A

Cloning

24
Q

An AI feature that enables it to accomplish tasks based on training data without explicit human instructions is called:
* API
* ML
* RAD
* VR

A

ML

25
Q

Which cryptographic attack relies on the concepts of probability theory?
* KPA
* Brute-force Attack
* Dictionary Attack
* Birthday Attack

A

Birthday Attack