Common Threats and Vulnerabilities Flashcards

1
Q

_________is malicious software used by threat actors to compromise target computers for harmful purposes.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a type of malware used to secretly gather data on a target computer and send it back to threat actors.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is a collection of malware tools that can be used by threat actors to remotely access and control target computers.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a type of malware that is used by threat actors to encrypt the hard drive content of a target computer.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a type of malware that redirects the browser on target computers to various predetermined websites chosen by threat actors.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a type of malware used by thread actors on target computers to take over computer resources for the purposes of mining.

A

Cryptojacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A self propagating malicious code that can propagate to other systems on the network and consume resources that could lead to a denial of service attack is called a_________.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer malware code that replicates itself on the target computer and spreads through the network, causing damage and distributing additional harmful payloads is called a ______.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A program that appears to be useful or harmless, but contains hidden code that can compromise the target system on which it runs is called a _______

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attack occurs when threat actors utilize botnets on several computers to overwhelm our targeted web server?

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false? Following a “clear screen” policy means that you keep your computer in a locked state when you are away from your desk.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Thread actors send emails randomly to a very large number of recipients with the intent to gather information or fraud for identity theft.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat actors send emails that are carefully designed to get a single recipient within an organization to respond and unknowingly, install malware onto their system.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat actors create fraudulent text messages to try to lure victims into revealing account information or installing malware.

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat actors use voice calls to manipulate an individual into releasing confidential data.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of attack intercepts and alters data sent between two hosts?

A

Man-in-the-middle

17
Q

What is spyware?

A

A program that collects information about users, systems, and browsing habits.

18
Q

What is the term for a collection of software tools used by an attacker to obtain administrator level access to a computer?

19
Q

What attack method requires the use of a phone to obtain personal or sensitive information?

20
Q

Which type of cyber attack includes fishing, tailgating, and shoulder surfing?

A

Social engineering

21
Q

Which social engineering attack targets high ranking individuals in order to compromise personal or sensitive data?

22
Q

Which type of physical attack involves entry into a restricted building or area?

A

Tailgating

23
Q

What type of attack is directed toward a specific group of users to trick them into visiting an infected website?

A

Watering hole

24
Q

You discover malware that has been collecting data and forwarding it to another server in a different country. For several months, what type of attack is this?

A

Advanced persistent threat

25
Q

What is a common type of attack launched under IoT devices?

A

DDoS attack

26
Q

True or false? Advanced persistent threat (ATP) attacks are used to steal data?

27
Q

An employee steals confidential technical specifications for a product for personal gain.

A

Malicious insider

28
Q

An employee takes home a storage drive without authorization, which is then stolen from the employee’s vehicle.

A

Negligent insider

29
Q

An employee gives their credentials to an attacker and a spear fishing attack, and the attacker uses the credentials to launch further attacks.

A

Compromise insider