Chapter 1.2 Flashcards
Malicious software?
Malware
Malware that gathers keystrokes?
Keylogger
Group of malware that coordinate attacks?
Botnet
Malware that generates advertisements?
Adware
Malware that copies itself and spreads through security vulnerabilities?
Worm
Malware that reproduces through user action?
Virus
Malware that threatens the user for payment?
Ransomware
Malware that mines digital currency like bitcoin?
Crypto-malware
Malware that pretends to be something else?
Trojan Horse
Software that is likely undesirable?
PUP (Potentially Unwanted Program)
Malware that infects the kernel of an operating system?
Rootkit
Malware that gathers information?
Spyware
Malware used to gain total access of a system?
RAT (Remote Access Trojan)
What does UEFI stand for?
Unified Extensible Firmware Interface
What prevents a rootkit from being installed on a modern system?
Secure Boot
What controls a botnet?
C&C Server (Command & Control)
Attack that disrupts a target by overwhelming it with a flood of Internet traffic?
DDOS (Distributed Denial of Service)
What type of attack waits for a predefined event before triggering?
Logic Bomb
What is the scrambled fingerprint of a password used for authentication?
Hash
Password cracking attack that uses few attempts with common passwords?
Spraying Attack
Password cracking attack that uses every possible combination?
Brute Force
Password cracking attack that uses common words from vocabulary?
Dictionary Attack
Password cracking that uses pre-compiled hashes?
Rainbow Table
Random characters added to a password before it is hashed?
Salt
What does HID stand for?
Human Interface Device
Attack that scans a person’s credit card while they are using it for another purpose?
Skimming
Act of duplicating a card with a magnetic stripe?
Card Cloning
Technology that can learn and adapt without following explicit instructions?
Machine Learning
Sequence of processes involved in the production and distribution of a commodity?
Supply Chain
Same hash value for two different plain texts?
Hash Collision
Attack that seeks to cause the victim to switch to a less-secure data transmission?
Downgrade Attack