Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks Flashcards

1
Q

What is a threat actor?

A

An attacker - anyone who launches a cyberattack on others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is open-source intelligence?

A

Any information that is available via web sites and social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do attackers exploit open-source intelligence?

A

They use the information to gather intel and strategize their attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ ____ is an attacker who uses existing computer scripts or code to launch attacks.

A

Script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ launches attacks as part of an activist movement or to further a cause

A

Hactivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An _____ is anyone who has legitimate access to an organization’s internal resources.

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some common security issues caused by insider threats?

A

Loss of confidentiality, integrity, and availability of an organization’s assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Competitors can also engage in attacks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does APT stand for and what is it?

A

Advanced Persistent Threat

A targeted attack against a network. Often sponsored by governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DoS stand for and what is it?

A

Denial of Service

From one attacker against one target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does DDoS stand for and what is it?

A

Distributed Denial of Service

From two or more attackers against a single target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between DoS and DDoS?

A

DoS is a single attacker to a single target. DDoS is two or more attackers/computers to a single target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ attacks often include sustained, abnormally high network traffic on the network interface card of the attacked computer

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ and _____ attacks often attempt to overload an application or service on a computer.

A

DoS DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ is a malicous code that attaches itself to a host application.

A

Virus
Note: The host application must be executed to run, and the malicious code executes when the host application is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: A virus does not try to replicate by finding other host applications to infect with the malicious code

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ____ is a self-replicating malware that travels throughout a network without assistance of a host application or user interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ___ resides in memory and can use different transport protocols to travel over the network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Worms do not consume significant bandwidth

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____ can replicate themselves hundreds of times and spread to all the systems in the network.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some types of malware?

A
  1. Trojans
  2. Viruses
  3. Worms
  4. Rootkits
  5. Ransomware
  6. Spyware
  7. Logic bombs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A ____ is a string of code embedded into an application or script that will execute in response to an event.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ____ provides another way of accessing a system

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Malware often installs _____ on systems to bypass normal authentication methods.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A ____ looks like something beneficial, but it's actually something malicious.
Trojan/Trojan horse
26
What are some forms that trojan horses can come in?
1. Pirated software 2. Useful utility software i.e. fake antivirus software 3. Game
27
What is a drive by download?
When web services include malicious code that attempts to download and install itself on users computers after the user visits
28
_______ masquerades as a free antivirus porgram
Rogueware/scareware
29
What does RAT stand for and what is it?
Remote access trojan A type of malware that allows attackers to take control of systems from remote locations; often delivered by drive-by downloads
30
True or False: Some RATs automatically collect and log keystrokes, usernames and passwords, incoming and outgoing email, chat sessions, and browser history as well as take screenshots.
True
31
____ is a type of Trojan
Ransomware
32
_____ is when attackers encrypt the user's data or take control of the computer and lock out the user. They they demand that the user pay a ransom to regain access to the data or computer.
Ransomware
33
True or False: Many organizations indicate that ransomware attacks continue to grow and are becoming one of the greatest cyber threats
True
34
Ransomware that encrypts the user's data is sometimes called ______
crypto-malware
35
_____ is when the user doesn't pay the ransom to decrypt the files and the attacker threatens to publish the files along with the victim's credentials.
Doxing
36
A ____ attempts to capture a user's keystrokes.
Keylogger
37
True or False: A keylogger is only software and never hardware
False You can purchase a USB keylogger to plug into a computer and plug the keyboard into the USB keylogger to record al keystrokes and store them within memory on the USB device
38
____ is software installed on users' systems without their awareness or consent
Spyware
39
______ purpose is often to monitor the user's computer and the user's activity and sends to a third party
Spyware
40
True or False: If spyware can access a user's private data, it results in a loss of integrity
False | Confidentiality is what is lost
41
True or False: Some examples of spyware activity are changing a user's home page, redirecting web browsers, and installing additional software within the browser.
True
42
______ _____ ______ tries to separate users from their money using data-harvesting techniques
Privacy invasion software
43
True or False: Privacy invasion software attempts to gather information to impersonate users, empty bank accounts, and steal identities.
True
44
True or False: Spyware often includes a keylogger
True
45
What was the primary intent of adware?
To learn a user's habits for the purpose of targeted advertising
46
____ are software robots
Bots
47
______ are a combination of robots and network
Botnets
48
Describe what a botnet is/does
Where multiple computers act as software robots and function together in a network often for malicious purposes
49
___ ____ are criminals who manage botnets
Bot herders
50
Bot herders use _____ ____ _____ software to control infected computers
Command and Control
51
True or False: Users are often unaware of activity being run on computers infected with command and control software
True
52
A ____ is a group of programs that hides the fact that the system has been infected or compromised by malicious code
Rootkit
53
True or False: Rootkits often modify the internal OS processes such as Windows Registry
True
54
Rootkits use _____ techniques to intercept calls to the operating system
Hooking
55
Another method used to detect rootkits is to ______
Boot into safe mode
56
____ ____ is the practice of using social tactics to gain information.
Social engineering
57
Some methods used in social engineering are:
1. Flattery and conning 2. Assuming a position of authority 3. Encouraging someone to perform a risky action 4. Encouraging someone to reveal sensitive information 5. Impersonating someone, such as an authorized technician 6. Tailgating or closely following authorized personnel without providing credentials
58
True or False: Social engineering tactics can occur in person, over the phone, while surfing the Internet, and via email.
True
59
_____ _____ methods are useful to prevent the success of impersonation attacks.
Identity verification
60
____ ____ is simply looking over the shoulder of someone to gain information
Shoulder surfing
61
What is one way to prevent should surfing?
To position monitors and other types of screens so that unauthorized personnel cannot see them.
62
A ____ ___ is another method to reduce shoulder surfing
Screen filter
63
A ___ is a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn't exist
Hoax
64
______ is the practice of one person following closely behind another without showing credentials.
Tailgating
65
_____ ____ is the practice of searching through trash or recycling containers to gain information from discarded documents.
Dumpster diving
66
A ____ ___ ___ attempts to discover which web sites a group of people are likely to visit and then infects those web sites with malware that can infect the visitors
Watering hole attack
67
___ is unwanted or unsolicited email
Spam
68
____ can include malicious links, malicious code, or malicious attachments
Spam
69
True or False: Laws require companies to include the ability to opt out of receiving emails from them
True
70
True or False: Malicious attackers may include opt-out instructions in spam e-mail to confirm the email address is valid
True
71
____ is the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link.
Phishing
72
True or False: Legitimate companies do not ask you to revalidate your credentials via email
True
73
A ____ is a link included in an email email that links to an image stored on an Internet server.
Beacon | Note: This is one reason why most email programs won't display images by default
74
_____ _____ is a targeted form of phishing.
Spear phishing
75
True or False: The use of digital signatures is one solution used to deter spear phishing via email
True
76
______ is a form of spear phishing that attempts to target high-level executives.
Whaling
77
Attackers consider high-level executives ____
Whales
78
True or False: With successful whaling, attackers gain confidential company information that they might not be able to get anywhere else.
True
79
______ attacks use the phone system to trick users into giving up personal and financial information.
Vhishing
80
True or False: When a vhishing attack uses VoIP it can spoof caller ID making it appear as if the call is coming from within the organization
True
81
Which of the following is not a common security control to protect against malware? 1. Spam filtering gateway 2. Anti-malware on mail gateways 3. All systems (workstations and servers) have anti-malware software installed on them 4. Boundaries or Firewalls for traffic monitoring of malware 5. Auto scripts to modify windows registry
Auto scripts to modify windows registry
82
Viruses and other malware have known patterns. ____ ____ (also called data definition files) define the patterns, and the antivirus software scans files for matching patterns.
Signature files
83
A _______ virus is not harmful to the system while it is in quarantine, but it’s still available for analysis.
Quarantined
84
______ _____ detection attempts to detect viruses that were previously unknown and do not have signatures.
Heuristic based
85
True or False: Heuristic-based analysis runs questionable code in a sandbox or virtualized environment specifically designed to protect the live environment, while it observes the code’s behavior.
True
86
Some antivirus scanners use ____ ____ ____ to detect modified system files.
File integrity checkers
87
True or False: A file integrity checker calculates hashes on system files as a baseline. It then periodically recalculates the hashes on these files and compares them with the hashes in the baseline. If the hashes are ever different, it indicates the system files have been modified.
True
88
The Microsoft File Checksum Integrity Verifier _____ tool can verify the integrity of all files within a folder, or a group of nested folders.
fciv.exe
89
____ ____ _____ is a security feature that prevents code from executing in memory regions marked as nonexecutable.
Data execution prevention (DEP)
90
What is the primary purpose of DEP?
To protect a system from malware
91
True or False: Encrypted data is being sent out of the network is a serious red flag and indicates malware is collecting data and sending it to an attacker.
True
92
True or False: Trained users provide a significant risk to any organization and are often one of the largest vulnerabilities.
False | Untrained users are the ones who provide a significant risk