Chapter 1.2 Flashcards

1
Q

Malicious software?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that gathers keystrokes?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Group of malware that coordinate attacks?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware that generates advertisements?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware that copies itself and spreads through security vulnerabilities?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware that reproduces through user action?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware that threatens the user for payment?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware that mines digital currency like bitcoin?

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware that pretends to be something else?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that is likely undesirable?

A

PUP (Potentially Unwanted Program)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware that infects the kernel of an operating system?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware that gathers information?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware used to gain total access of a system?

A

RAT (Remote Access Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does UEFI stand for?

A

Unified Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What prevents a rootkit from being installed on a modern system?

A

Secure Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What controls a botnet?

A

C&C Server (Command & Control)

17
Q

Attack that disrupts a target by overwhelming it with a flood of Internet traffic?

A

DDOS (Distributed Denial of Service)

18
Q

What type of attack waits for a predefined event before triggering?

A

Logic Bomb

19
Q

What is the scrambled fingerprint of a password used for authentication?

A

Hash

20
Q

Password cracking attack that uses few attempts with common passwords?

A

Spraying Attack

21
Q

Password cracking attack that uses every possible combination?

A

Brute Force

22
Q

Password cracking attack that uses common words from vocabulary?

A

Dictionary Attack

23
Q

Password cracking that uses pre-compiled hashes?

A

Rainbow Table

24
Q

Random characters added to a password before it is hashed?

A

Salt

25
Q

What does HID stand for?

A

Human Interface Device

26
Q

Attack that scans a person’s credit card while they are using it for another purpose?

A

Skimming

27
Q

Act of duplicating a card with a magnetic stripe?

A

Card Cloning

28
Q

Technology that can learn and adapt without following explicit instructions?

A

Machine Learning

29
Q

Sequence of processes involved in the production and distribution of a commodity?

A

Supply Chain

30
Q

Same hash value for two different plain texts?

A

Hash Collision

31
Q

Attack that seeks to cause the victim to switch to a less-secure data transmission?

A

Downgrade Attack