Chapter 2 Key Terms Flashcards

1
Q
spreading rapidly to other systems to impact a large number of users
  payload 
  RAT 
  circulation 
  trojan
A

circulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
the nefarious actions the malware performs
  flatulence 
  concealment 
  payload capabilitie 
  payload
A

payload capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
a false warning, often contained in an email message claiming to come from the IT department
  hoax 
  phishing 
  whaling 
  impersonation
A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
to watch an individual entering the security code on a keypad; a user casually observes someone entering secret information, such as the security code on a door keypad
  shoulder surfing 
  spear phishing 
  tailgating 
  watering hole attack
A

shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
delivers advertising content in a manner that is unexpected and unwanted by the user
  backdoor 
  impersonation 
  adware 
  spyware
A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
avoiding detection by hiding its presence from software scanners that are looking for malware
  concealment 
  virus 
  rootkit 
  worm
A

concealment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
digging through trash receptacles to find information that can be useful in an attack
  watering hole attack 
  tailgating 
  dumpster diving 
  shoulder surfing
A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
a malicious program that uses a computer network to replicate
  trojan 
  concealment 
  virus 
  worm
A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
used to delete data; a computer code that is typicaly added to a legitimate program but lies dormant until a specific logical event triggers it
  logic bomb 
  backdoor 
  time bomb 
  whaling
A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
an executable program that masquerades as performing a benign activity but also does something malicious
  worm 
  trojan 
  RAT 
  virus
A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
once an authorized person opens the door, one or more individuals can follow behind and also enter
  dumpster diving 
  mantrap 
  shoulder surfing 
  tailgating
A

tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
gives access to a computer, program, or service that circumvents any normal security protections
  social engineering 
  rootkit 
  spyware 
  backdoor
A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols
  trojan 
  worm 
  RAT 
  virus
A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
a means of gathering information for an attack by relying on the weaknesses of individuals
  phishing 
  whaling 
  gregarious 
  social engineering
A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
sending millions of generic emails; targetting specific users
  vishing 
  whaling 
  phishing 
  spear phishing
A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
to masquerade as a real or fictitious character and then play out the role of that person on a victim
  impersonation 
  hoax 
  identity theft 
  phishing
A

impersonation

17
Q
blocking the user from accessing the computer; encrypting all files on the computer
  crypto-malware 
  rootkit 
  keylogger 
  ransomware
A

cypto-malware

18
Q
directed toward a smaller group of specific individuals, such as the major executives working for a manufacturing company
  dumpster diving 
  whaling 
  social engineering 
  watering hole attack
A

watering hole attack

19
Q
a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code
  logic bomb 
  concealment 
  worm 
  virus
A

virus

20
Q

silently captures and stores each keystroke that a user types on the computer’s keyboard

keylogger
phishing
whaling
spyware

A

keylogger

21
Q
prevents a user's device from properly and fully fuctioning until a fee is paid
  spyware 
  crypto-malware 
  ransomware 
  rootkit
A

ransomware

22
Q
tracking software that is deployed without the consent or control of the user
  spyware 
  adware 
  backdoor 
  social engineering
A

spyware

23
Q
targets the "big fish," namely, wealthy individuals or senior executives within a business who typically would have larger sums of money in a bank account that an attacker could access if the attack is successful
  phishing 
  spear phishing 
  impersonation 
  whaling
A

whaling

24
Q
once the malware reaches a system, it must embed itself into that system.
  infection 
  rootkit 
  virus 
  concealment
A

infection

25
Q
an attacker calls a victim who, upon answering, hears a recorded message that pretends to be from the user's bank stating that her credit card has experienced fraudulent activity or that her bank account has had unusual activity
  vishing 
  hoax 
  whaling 
  phishing
A

vishing

26
Q

Which of the following describes the key difference between vishing and phishing attacks?
A.Phishing is used by attackers to steal a person’s identity.
B.Vishing attacks require some knowledge of the target of attack.
C.Vishing attacks are accomplished using telephony services.
D.Phishing is a category of social engineering attack.

A

C.Vishing attacks are accomplished using telephony services.

27
Q
Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?
A.Logic bomb
B.Trojan
C.Scareware
D.Ransomware
A

A. Logic bomb

28
Q
A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network. Which of the following is the MOST likely method used to gain access to the other host?
A.Backdoor
B.Pivoting
C.Persistence
D.Logic Bomb
A

A. Backdoor

29
Q

A systems administrator found a suspicious file in the root of the file system. The file contains URLs, usernames, passwords, and text from other documents being edited on the system. Which of the following types of malware would generate such a file?A.Keylogger
B.Rootkit
C.Bot
D.RAT

A

Keylogger

30
Q

An attacker wearing a building maintenance uniform approached a company’s receptionist asking for access to a secure area. The receptionist asks for identification, a building access badge and checks the company’s list approved maintenance personnel prior to granting physical access to the secure are. The controls used by the receptionist are in place to prevent which of the followingtypes of attacks?A.Tailgating
B.Shoulder surfing
C.Impersonation
D.Hoax

A

C. Impersonation