Comparing Threats, Vulnerabilities, and Common Attacks Flashcards

1
Q

A targeted attack against a network by an organized group that is sponsored by a nation-state or government

A

Advanced Persistent Threat - APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that seems legitimate or beneficial but its actually malicious

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware that masquerades as a free antivirus program

A

Rogueware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of malware that allows attackers to take control of systems from remote locations

A

Remote Access Trojan - RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A specific type of trojan that encrypts the user’s data or take control of the computer and lock out the user. Demand for payment in exchange for access follows

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware that encrypts the user’s data is sometimes referred to as

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A blackmail technique associated with ransomware that threatens to publish the files along with the victims credentials

A

Doxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of software that tries to separate users from their money using data-harvesting techniques

A

Privacy-invasive software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A message that tells of impending doom from a virus or other security threat that simply doesn’t exist

A

hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attempts to discover which web sites a group of people are likely to visit and then infects those web sites with malware that can infect the visitors

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This occurs when a user or process accesses elevated rights and permissions

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of threat detection that occurs from recognizing known patters ork data definition files

A

Signature based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of threat detection that detects previously unknown threats that do not have signatures to include zero-day exploits

A

Heuristic based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of threat detection that detect modified system files. Capable of finding rootkit infections.

A

File Integrity Checkers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is a security feature that prevents code from executing in memory regions marked as non-executable. It’s primary purpose is to protect system from malware

A

Data Execution Prevention - DEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Proprietary to Cisco and combines multiple technologies to protect a network before an attack, during an attack and after an attack.

A

AMP - Advanced Malware Protection