Chapter 2 Type of Attack Indicators Flashcards
1
Q
Crypto-Malware
A
- Malware that uses a system’s resources to mine cryptocurrency.
- Theft of services attack uses CPU cycles of someone else’s computer to do crypto mining.
2
Q
How are Trojans used to attack a system?
A
- A standalone program that must be copied and installed by an authorized user.
- Appears to do one thing but hides some other functionality.
3
Q
Worm
A
- Pieces of code that attempt to penetrate network and computer systems.
- This can survive on its own.
4
Q
Logic Bomb
A
- A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload.
5
Q
Ransomware
A
- Malware that typically encrypts files on a system and then leaves them unusable or temporarily until a ransom is paid.
6
Q
Spyware
A
- Usually installed without the user’s knowledge.
- Can record activities such as keyloggers.
7
Q
Spraying
A
- An attack that uses a limited number of commonly used passwords and applies them to a large number of accounts.
8
Q
Potentially Unwanted Programs (PUP)
A
A way for companies and antivirus vendors to identify programs that may have adverse effects on a computer’s security or privacy.
9
Q
Fileless Virus
A
- Memory-based attack, hard to detect.
- A piece of malware operates only in memory, never touches the filesystem.
10
Q
Backdoor
A
- Programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system.
- Common backdoors include: Netbus and Back Orifice.
11
Q
Man in the Middle Attack
A
A mechanism whereby an attacker can inject himself into middle of a conversation between two devices.
12
Q
Command and Control
A
- Used to control malware that has been launched against targets.
13
Q
Rainbow Tables
A
Precomputed tables or hash values associated with passwords.
14
Q
Dictionary
A
Another method of determining passwords is to use a password-cracking program that uses a list of dictionary words to try to guess the password.
15
Q
Hybrid Cloud
A
- One where elements from private, public, and community cloud structures are combined.
- Environments not joined together but are used together.