Attack types Flashcards
Which type of malware can reproduce itself, and requires user interaction to execute the program.
Virus.
Which type of malware reproduces itself, but requires no user interaction and can jump from machine to machine, and uses the network as its transmission medium?
Worm.
Which type of virus is part of the application?
Program virus.
Which type of virus is stored inside of a storage device and when you start your computer, the virus itself is launched?
Boot sector virus.
Where are script viruses usually based?
In the operating system or a browser.
Which type of virus is common to have made its way into Microsoft office?
Macro virus
Which type of virus never installs itself or saves itself as a file on your system, and instead operates solely in the memory of the computer, and also typically will add an auto start in the registry to establish persistence?
Fileless virus.
Which attack is an unfortunate use of public key cryptography, and encrypts every file on a drive until a sum of money is paid?
Ransomware
Which type of malware is designed to appear as a normal program in order to circumvent antivirus and user detection?
Trojan horse.
What is a pup?
Potentially unwanted program.
Not necessarily malicious just annoying.
Could be an annoying browser toolbar that is very hard to uninstall or a backup utility that displays ads.
Which type of malware is a way of circumventing normal authentication methods and establishing persistence?
Backdoor
Which type of malware is similar to a backdoor, but gives much deeper administrative control over a computer remotely?
RAT
remote access trojan
Which type of malware modifies core system files and integrates itself in the kernal of the computer?
Rootkit
Which type of malware forces you to have many many pop ups of advertisements?
Adware
Which type of malware is most interested in your personal information and recording what you do on the computer?
Spyware.
Keyloggers commonly will be a tool used in spyware.
Which type of malware typically operates with the goal of taking control of a computer for a larger goal, including many computers?
Botnet
Which type of attack is triggered by a specific event or time, typically left behind by a disgruntled employee or put in place by someone with a grudge.
Logic bomb
Which type of attack is happening when a bad actor attempts to log into many different user’s accounts, with only a few attempts on each, in an attempt to circumvent security measures or alerts?
Spraying attack
Which attack programmatically tries every combination of letters,symbols,and numbers to try and match a password or a hash of a password?
Brute force attack
Which type of attack programmatically attempts to match passwords using a wordlist instead of every possible combination of characters?
Dictionary attack.
Which type of password attack uses a long list of pre-hashed phrases and their plaintext counterpart to speed up the password cracking process?
Rainbow table attack