Attack types Flashcards

1
Q

Which type of malware can reproduce itself, and requires user interaction to execute the program.

A

Virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of malware reproduces itself, but requires no user interaction and can jump from machine to machine, and uses the network as its transmission medium?

A

Worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of virus is part of the application?

A

Program virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of virus is stored inside of a storage device and when you start your computer, the virus itself is launched?

A

Boot sector virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where are script viruses usually based?

A

In the operating system or a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of virus is common to have made its way into Microsoft office?

A

Macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of virus never installs itself or saves itself as a file on your system, and instead operates solely in the memory of the computer, and also typically will add an auto start in the registry to establish persistence?

A

Fileless virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which attack is an unfortunate use of public key cryptography, and encrypts every file on a drive until a sum of money is paid?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of malware is designed to appear as a normal program in order to circumvent antivirus and user detection?

A

Trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a pup?

A

Potentially unwanted program.
Not necessarily malicious just annoying.
Could be an annoying browser toolbar that is very hard to uninstall or a backup utility that displays ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of malware is a way of circumventing normal authentication methods and establishing persistence?

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of malware is similar to a backdoor, but gives much deeper administrative control over a computer remotely?

A

RAT

remote access trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of malware modifies core system files and integrates itself in the kernal of the computer?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of malware forces you to have many many pop ups of advertisements?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of malware is most interested in your personal information and recording what you do on the computer?

A

Spyware.

Keyloggers commonly will be a tool used in spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of malware typically operates with the goal of taking control of a computer for a larger goal, including many computers?

A

Botnet

17
Q

Which type of attack is triggered by a specific event or time, typically left behind by a disgruntled employee or put in place by someone with a grudge.

A

Logic bomb

18
Q

Which type of attack is happening when a bad actor attempts to log into many different user’s accounts, with only a few attempts on each, in an attempt to circumvent security measures or alerts?

A

Spraying attack

19
Q

Which attack programmatically tries every combination of letters,symbols,and numbers to try and match a password or a hash of a password?

A

Brute force attack

20
Q

Which type of attack programmatically attempts to match passwords using a wordlist instead of every possible combination of characters?

A

Dictionary attack.

21
Q

Which type of password attack uses a long list of pre-hashed phrases and their plaintext counterpart to speed up the password cracking process?

A

Rainbow table attack