Chapter 6: Comparing Threats, Vulnerabilities, and Common Attacks Flashcards

1
Q

_____ _____ use existing computer scripts or code to launch attacks. They typically have very little expertise or sophistication, and very little funding.

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A_____ launches attacks as part of an activist movement or to further a cause.

A

hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____(such as employees of a company) have legitimate access to an organization’s internal resources. They sometimes become malicious out of greed or revenge.

A

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Competitors sometimes engage in attacks to gain _____ _____ about another company.

A

proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organized crime is an enterprise that employs a group of

individuals working together in criminal activities. Their primary motivation is _____.

A

money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Some attackers are organized and sponsored by a _____-_____ or government.

A

nation-state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An ____ ____ ____ is a targeted attack against a network. It has both the capability and intent to launch sophisticated and targeted attacks. They are sponsored by a nation-state and often have a significant amount of resources and funding.

A

advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A common method attackers often use before launching an attack is to gather information from ___-____ _____, including any information available via web sites and social media.

A

open-source intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____includes several different types of malicious code, including viruses, worms, logic bombs, backdoors, Trojans, ransomware, rootkits, and more.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A_____ is malicious code that attaches itself to a host application. The code runs when the application is launched.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A_____ is self-replicating malware that travels throughout a network without user intervention.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____ _____ executes in response to an event, such as a day, time, or condition. Malicious insiders have planted logic bombs into existing systems, and these logic bombs have delivered their payload after the employee left the company.

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____provide another way of accessing a system. Malware often inserts this into systems, giving attackers remote access to systems.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _____ appears to be one thing, such as pirated software or free antivirus software, but is something malicious. s.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ ____ ____ is a type of malware that allows attackers to take control of systems from remote location

A

remote access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Drive-by downloads often attempt to infect systems with _____.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____ is a type of malware that takes control of a user’s system or data. Criminals attempt to extort payment as ransom combined to return control to the user .

A

Ransomware

18
Q

_____-_____ is ransomware that encrypts the user’s data. Attackers demand payment to decrypt the data.

A

Crypto- malware

19
Q

_____ is software installed on user systems without the user’s knowledge or consent and it monitors the user’s activities. It sometimes includes a keylogger that records user keystrokes.

A

Spyware

20
Q

A_____ is a group of computers called zombies controlled through a command-and- control server. Attackers use malware to join computers to botnets.

A

botnet

21
Q

____ ____ launch attacks through botnets.

A

Bot herders

22
Q

_____take root-level or kernel-level control of a system. They
hide their processes to avoid detection. They can remove user privileges and modify system files.

A

Rootkits

23
Q

_____ _____ is the practice of using social tactics to gain information or trick users into performing an action they wouldn’t normally take.

A

Social engineering

24
Q

_____ _____ attacks can occur in person, over the phone, while surfing the Internet, and via email. Many social engineers attempt to impersonate others.

A

Social engineering

25
Q

_____ _____ is an attempt to gain unauthorized information through casual observation, such as looking over someone’s shoulder, or monitoring screens with a camera. Screen filters can thwart these attempts.

A

Shoulder surfing

26
Q

A_____ is a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist.

A

hoax

27
Q

_____ is the practice of one person following closely behind another without showing credentials. Mantraps help prevent this.

A

Tailgating

28
Q

_____ ____ search through trash looking for information. Shredding or burning documents reduces the risk of dumpster diving.

A

Dumpster divers

29
Q

____ ____ attacks discover sites that a targeted group visits and trusts. Attackers then modify these sites to download malware. When the targeted group visits the modified site, they are more likely to download and install infected files.

A

Watering hole

30
Q

____is unwanted or unsolicited email. Attackers often use spam in different types of attacks.

A

Spam

31
Q

____ is the practice of sending email to users with the purpose of tricking them into revealing sensitive information, installing malware, or clicking on a link.

A

Phishing

32
Q

____ ____ and ____ are types of phishing. ____ ____ targets specific groups of users and ____ targets high-level executives.

A

Spear phishing and whaling

33
Q

____ is a form of phishing that uses voice over the telephone and often uses Voice over IP (VoIP). Some attacks start with a recorded voice and then switch over to a live person.

A

Vishing

34
Q

Antivirus software can detect and block different types of malware, such as worms, viruses, and Trojans. Antivirus software uses_____ to detect known malware.

A

signatures

35
Q

When downloading signatures manually,____ can verify the integrity of signature files.

A

hashes

36
Q

Antivirus software typically includes a ____ ____ ____ to detect files modified by a rootkit.

A

file integrity checker

37
Q

____ ____ ____ prevents code from executing in memory locations marked as nonexecutable. The primary purpose of DEP is to protect a system from malware.

A

Data execution prevention (DEP)

38
Q

____-____ software attempts to block unsolicited email. You can configure a spam filter to block individual email addresses and email domains.

A

Anti-spam

39
Q

____-____ exploits take

advantage of vulnerabilities that are not known by trusted sources.

A

Zero-day

40
Q

____ ____ and other criminals employ several psychology- based principles to help increase the effectiveness of their attacks. They are authority, intimidation, consensus, scarcity, urgency, familiarity, and trust.

A

Social engineers