4 Flashcards
What is a PUP? (Select 3 answers)
* A type of computer program not explicitly classified as malware by AV software
* An application downloaded and installed without the user’s consent (illegal app)
* A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
* An application downloaded and installed with the user’s consent (legal app)
* A type of computer program explicitly classified as malware by AV applications
* A type of free, utility software often bundled with a paid app
- A type of computer program not explicitly classified as malware by AV software
- A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
- An application downloaded and installed with the user’s consent (legal app)
Which type of malware resides only in RAM?
* Rootkit
* Fileless virus
* Backdoor
* Logic bomb
Fileless virus
What is the function of a C2 server?
* Spam distribution
* Botnet control
* Authentication, Authorization, and Accounting (AAA)
* Penetration testing
Botnet control
A malware-infected network host under remote control of a hacker is commonly referred to as:
* Trojan
* Worm
* Bot
* Honeypot
Bot
Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?
* Botnet
* Intranet
* Honeynet
* Extranet
Botnet
Which of the following is an example of cryptomalware?
* Backdoor
* Ransomware
* Keylogger
* Rootkit
Ransomware
Malicious code activated by a specific event is called:
* Spyware
* Backdoor
* Rootkit
* Logic bomb
Logic bomb
Malicious software collecting information about users without their knowledge/consent is known as:
* Cryptomalware
* Adware
* Ransomware
* Spyware
Spyware
Which of the following is an example of spyware?
* Keylogger
* Vulnerability scanner
* Computer worm
* Packet sniffer
Keylogger
Which type of Trojan enables unauthorized remote access to a compromised system?
* pcap
* RAT
* MaaS
* pfSense
RAT
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
* Rootkit
* Spyware
* Backdoor
* Trojan
Rootkit
Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
* Logic bomb
* Trojan horse
* Rootkit
* Backdoor
Backdoor
A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
* Replay attack
* Dictionary attack
* Spraying attack
* Birthday attack
Spraying attack
Which password attack bypasses account-lockout policies?
* Birthday attack
* Spraying attack
* Dictionary attack
* Replay attack
Spraying attack
Which password attack takes advantage of a predefined list of words?
* Birthday attack
* Replay attack
* Dictionary attack
* Brute-force attack
Dictionary attack