Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks Flashcards

1
Q

What is a threat actor?

A

An attacker - anyone who launches a cyberattack on others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is open-source intelligence?

A

Any information that is available via web sites and social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do attackers exploit open-source intelligence?

A

They use the information to gather intel and strategize their attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ ____ is an attacker who uses existing computer scripts or code to launch attacks.

A

Script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ launches attacks as part of an activist movement or to further a cause

A

Hactivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An _____ is anyone who has legitimate access to an organization’s internal resources.

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some common security issues caused by insider threats?

A

Loss of confidentiality, integrity, and availability of an organization’s assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Competitors can also engage in attacks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does APT stand for and what is it?

A

Advanced Persistent Threat

A targeted attack against a network. Often sponsored by governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DoS stand for and what is it?

A

Denial of Service

From one attacker against one target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does DDoS stand for and what is it?

A

Distributed Denial of Service

From two or more attackers against a single target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between DoS and DDoS?

A

DoS is a single attacker to a single target. DDoS is two or more attackers/computers to a single target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ attacks often include sustained, abnormally high network traffic on the network interface card of the attacked computer

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ and _____ attacks often attempt to overload an application or service on a computer.

A

DoS DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ is a malicous code that attaches itself to a host application.

A

Virus
Note: The host application must be executed to run, and the malicious code executes when the host application is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: A virus does not try to replicate by finding other host applications to infect with the malicious code

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ____ is a self-replicating malware that travels throughout a network without assistance of a host application or user interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ___ resides in memory and can use different transport protocols to travel over the network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Worms do not consume significant bandwidth

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____ can replicate themselves hundreds of times and spread to all the systems in the network.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some types of malware?

A
  1. Trojans
  2. Viruses
  3. Worms
  4. Rootkits
  5. Ransomware
  6. Spyware
  7. Logic bombs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A ____ is a string of code embedded into an application or script that will execute in response to an event.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ____ provides another way of accessing a system

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Malware often installs _____ on systems to bypass normal authentication methods.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A ____ looks like something beneficial, but it’s actually something malicious.

A

Trojan/Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are some forms that trojan horses can come in?

A
  1. Pirated software
  2. Useful utility software i.e. fake antivirus software
  3. Game
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a drive by download?

A

When web services include malicious code that attempts to download and install itself on users computers after the user visits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

_______ masquerades as a free antivirus porgram

A

Rogueware/scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does RAT stand for and what is it?

A

Remote access trojan
A type of malware that allows attackers to take control of systems from remote locations; often delivered by drive-by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

True or False: Some RATs automatically collect and log keystrokes, usernames and passwords, incoming and outgoing email, chat sessions, and browser history as well as take screenshots.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

____ is a type of Trojan

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

_____ is when attackers encrypt the user’s data or take control of the computer and lock out the user. They they demand that the user pay a ransom to regain access to the data or computer.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

True or False: Many organizations indicate that ransomware attacks continue to grow and are becoming one of the greatest cyber threats

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Ransomware that encrypts the user’s data is sometimes called ______

A

crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

_____ is when the user doesn’t pay the ransom to decrypt the files and the attacker threatens to publish the files along with the victim’s credentials.

A

Doxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A ____ attempts to capture a user’s keystrokes.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

True or False: A keylogger is only software and never hardware

A

False
You can purchase a USB keylogger to plug into a computer and plug the keyboard into the USB keylogger to record al keystrokes and store them within memory on the USB device

38
Q

____ is software installed on users’ systems without their awareness or consent

A

Spyware

39
Q

______ purpose is often to monitor the user’s computer and the user’s activity and sends to a third party

A

Spyware

40
Q

True or False: If spyware can access a user’s private data, it results in a loss of integrity

A

False

Confidentiality is what is lost

41
Q

True or False: Some examples of spyware activity are changing a user’s home page, redirecting web browsers, and installing additional software within the browser.

A

True

42
Q

______ _____ ______ tries to separate users from their money using data-harvesting techniques

A

Privacy invasion software

43
Q

True or False: Privacy invasion software attempts to gather information to impersonate users, empty bank accounts, and steal identities.

A

True

44
Q

True or False: Spyware often includes a keylogger

A

True

45
Q

What was the primary intent of adware?

A

To learn a user’s habits for the purpose of targeted advertising

46
Q

____ are software robots

A

Bots

47
Q

______ are a combination of robots and network

A

Botnets

48
Q

Describe what a botnet is/does

A

Where multiple computers act as software robots and function together in a network often for malicious purposes

49
Q

___ ____ are criminals who manage botnets

A

Bot herders

50
Q

Bot herders use _____ ____ _____ software to control infected computers

A

Command and Control

51
Q

True or False: Users are often unaware of activity being run on computers infected with command and control software

A

True

52
Q

A ____ is a group of programs that hides the fact that the system has been infected or compromised by malicious code

A

Rootkit

53
Q

True or False: Rootkits often modify the internal OS processes such as Windows Registry

A

True

54
Q

Rootkits use _____ techniques to intercept calls to the operating system

A

Hooking

55
Q

Another method used to detect rootkits is to ______

A

Boot into safe mode

56
Q

____ ____ is the practice of using social tactics to gain information.

A

Social engineering

57
Q

Some methods used in social engineering are:

A
  1. Flattery and conning
  2. Assuming a position of authority
  3. Encouraging someone to perform a risky action
  4. Encouraging someone to reveal sensitive information
  5. Impersonating someone, such as an authorized technician
  6. Tailgating or closely following authorized personnel without providing credentials
58
Q

True or False: Social engineering tactics can occur in person, over the phone, while surfing the Internet, and via email.

A

True

59
Q

_____ _____ methods are useful to prevent the success of impersonation attacks.

A

Identity verification

60
Q

____ ____ is simply looking over the shoulder of someone to gain information

A

Shoulder surfing

61
Q

What is one way to prevent should surfing?

A

To position monitors and other types of screens so that unauthorized personnel cannot see them.

62
Q

A ____ ___ is another method to reduce shoulder surfing

A

Screen filter

63
Q

A ___ is a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist

A

Hoax

64
Q

______ is the practice of one person following closely behind another without showing credentials.

A

Tailgating

65
Q

_____ ____ is the practice of searching through trash or recycling containers to gain information from discarded documents.

A

Dumpster diving

66
Q

A ____ ___ ___ attempts to discover which web sites a group of people are likely to visit and then infects those web sites with malware that can infect the visitors

A

Watering hole attack

67
Q

___ is unwanted or unsolicited email

A

Spam

68
Q

____ can include malicious links, malicious code, or malicious attachments

A

Spam

69
Q

True or False: Laws require companies to include the ability to opt out of receiving emails from them

A

True

70
Q

True or False: Malicious attackers may include opt-out instructions in spam e-mail to confirm the email address is valid

A

True

71
Q

____ is the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link.

A

Phishing

72
Q

True or False: Legitimate companies do not ask you to revalidate your credentials via email

A

True

73
Q

A ____ is a link included in an email email that links to an image stored on an Internet server.

A

Beacon

Note: This is one reason why most email programs won’t display images by default

74
Q

_____ _____ is a targeted form of phishing.

A

Spear phishing

75
Q

True or False: The use of digital signatures is one solution used to deter spear phishing via email

A

True

76
Q

______ is a form of spear phishing that attempts to target high-level executives.

A

Whaling

77
Q

Attackers consider high-level executives ____

A

Whales

78
Q

True or False: With successful whaling, attackers gain confidential company information that they might not be able to get anywhere else.

A

True

79
Q

______ attacks use the phone system to trick users into giving up personal and financial information.

A

Vhishing

80
Q

True or False: When a vhishing attack uses VoIP it can spoof caller ID making it appear as if the call is coming from within the organization

A

True

81
Q

Which of the following is not a common security control to protect against malware?

  1. Spam filtering gateway
  2. Anti-malware on mail gateways
  3. All systems (workstations and servers) have anti-malware software installed on them
  4. Boundaries or Firewalls for traffic monitoring of malware
  5. Auto scripts to modify windows registry
A

Auto scripts to modify windows registry

82
Q

Viruses and other malware have known patterns. ____ ____ (also called data definition files) define the patterns, and the antivirus software scans files for matching patterns.

A

Signature files

83
Q

A _______ virus is not harmful to the system while it is in quarantine, but it’s still available for analysis.

A

Quarantined

84
Q

______ _____ detection attempts to detect viruses that were previously unknown and do not have signatures.

A

Heuristic based

85
Q

True or False: Heuristic-based analysis runs questionable code in a sandbox or virtualized environment specifically designed to protect the live environment, while it observes the code’s behavior.

A

True

86
Q

Some antivirus scanners use ____ ____ ____ to detect modified system files.

A

File integrity checkers

87
Q

True or False: A file integrity checker calculates hashes on system files as a baseline. It then periodically recalculates the hashes on these files and compares them with the hashes in the baseline. If the hashes are ever different, it indicates the system files have been modified.

A

True

88
Q

The Microsoft File Checksum Integrity Verifier _____ tool can verify the integrity of all files within a folder, or a group of nested folders.

A

fciv.exe

89
Q

____ ____ _____ is a security feature that prevents code from executing in memory regions marked as nonexecutable.

A

Data execution prevention (DEP)

90
Q

What is the primary purpose of DEP?

A

To protect a system from malware

91
Q

True or False: Encrypted data is being sent out of the network is a serious red flag and indicates malware is collecting data and sending it to an attacker.

A

True

92
Q

True or False: Trained users provide a significant risk to any organization and are often one of the largest vulnerabilities.

A

False

Untrained users are the ones who provide a significant risk