Common Attack Types Flashcards

1
Q

Backdoor

A

a means of regaining access to a compromised system by installing/configuring software to enable remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Brute force attack

A

an attack made by trying all possible combinations of passwords or encryption keys until the
correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Buffer overflow

A

occurs when a program tries to store more data in a buffer than it can hold, can corrupt or overwrite data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cross-site scripting

A

when an attacker uses a web application to send malicious code to a different end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DoS attack

A

an assault from a single source that floods it with so many requests that it becomes overwhelmed and either stops or becomes impaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social engineering

A

an attempt to exploit social vulnerabilities to gain access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

email attack that attempts to convince a user that the originator is genuine, but with the intention of obtaining information for use in social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spear phishing

A

an attack where social engineering techniques are used to masquerade as a trusted party to obtain
important information such as passwords from the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SQL injection

A

When specially crafted user-controlled input consisting of SQL syntax is used without proper validation as part of SQL queries, it is possible to glean information from the database in ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zero-day exploit

A

a vulnerability that is exploited before the software creator is even aware of its existence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Viruses

A

a piece of code that can replicate itself and spread from one computer to another. It requires intervention or execution to replicate and/or cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network worm

A

a piece of self-replicating code designed to

spread itself across computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan horses

A

a piece of malware that gains access to a system by hiding within a genuine application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnets

A

a large network of compromised computers that can be controlled to launch large-scale attacks such as denial-of-service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

malware that gathers information about a person without their knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adware

A

Designed to present unwanted advertisements to users.

17
Q

Ransomware

A

malware that locks or encrypts data and demands a payment to unlock it