Comptia+ Chapter 5 Flashcards

1
Q

Malware

A

Malicious software designed to interfere with a computer’s normal functions and can be used to commit an unwanted and harmful action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

Malicious software designed to extort money from victims in exchange for their endpoint device to be restored to its normal working state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Keylogger

A

Software or hardware that silently captures and stores each keystroke that a user types on the computer’s keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

Tracking software that is deployed without the consent or control of the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

An executable program that masquerades as performing a benign activity but also does something malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote access Trojan (RAT)

A

Basic functionality of a Trojan but also gives the threat agent unauthorized remote access to the victim’s computer by using specially configured communication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

Software that infects a computer with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File-based virus

A

Malicious computer code that becomes part of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless virus

A

Viruses that take advantage of native services and processes that are part of the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

A malicious program that uses a computer network to replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bloatware

A

Software installed on a device without the user requesting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bot

A

An infected robot computer; software that allows the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic bomb

A

Computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rootkit

A

Malware that can hide its presence and the presence of other malware on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Backdoor

A

Gives access to a computer, program, or service that circumvents any normal security protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Indicator of attack (IoA)

A

A sign an attack is currently underway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Account lockout

A

An indicator of attack in which a user account is inaccessible through a normal login attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Concurrent session usage.

A

An indicator of attack in which both a legitimate user and an attacker are logged into the same account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Blocked content

A

An indicator of attack in which data is no longer accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Impossible travel.

A

An indicator of attack in which a resource is accessed that is not possible due to geography.

21
Q

Resource consumption

A

An indicator of attack in which system resources such as memory or processing capabilities are suddenly depleted.

22
Q

Resource inaccessibility

A

An indicator of attack in which a large-scale attack can block system resources from being accessed.

23
Q

Out-of-cycle logging

A

An indicator of attack in which log records do not correspond to actual events that have occurred

24
Q

Published/undocumented

A

An indicator of attack in which evidence from external sources can be used to identify and attack

25
Missing logs
An indicator of attack in which log files have mysteriously been deleted.
26
Privilege escalation
An attack, in which the threat actor gains illicit access of elevated rights or privileges beyond what is entitled for a user.
27
Buffer overflow attack
An attack in which a process attempts to store data in Ram beyond the boundaries of a fixed length storage buffer, so an attacker can overflow the buffer with a new address pointing to the attacker's malware code.
28
Injections
An attack in which threat actors introduced something into RAM
29
Web-based attacks
Application attacks directed at programs running on internet web servers.
30
Directry traversal
An attack in which a threat actor takes advantage of a vulnerability to move from the root directory to other restricted directories.
31
Cross-site scripting
An attack, in which a website accepts user input without validating it, so it can be exploited.
32
SQL injection
An attack the insert statements to manipulate a database server.
33
34
Antivirus (AV)
Software that examines a computer for file-based virus infections as well as monitors computer activity and scans new documents that might contain a virus
35
Static analysis
Signature-based monitoring; AV software scans files by attempting to match known virus patterns against potentially infected files
36
Dynamic analysis
Heuristic monitoring; uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches
37
Secure cookie
A cookie that is only sent to the server with an encrypted request over the secure HTTPS protocol
38
HTTP Response Headers
A response from the web server that tells the browser how to behave while communicating with the website
39
HTTP Strict Transport Security (HSTS)
Forces browser to communicate over more secure HTTPS; encrypts transmissions to prevent unauthorized user from intercepting
40
Content Security Policy (CSP)
Restricts the resources a user is allowed to load within the website; protects against injection attacks
41
Cross Site Scripting Protection (X-XSS)
Prohibits a page from loading if it detects a cross-site scripting attack; prevents XSS attacks
42
X-Frame-Options
Prevents attackers from "overlaying" their content on the webpage; foils a threat actor's attempt to trick a user into providing personal information
43
Host intrusion detection system (HIDS)
Software-based application that runs on an endpoint computer and can detect that an attack has occurred
44
Host intrusion prevention system (HIPS)
Software that monitors endpoint activity to immediately block a malicious attack by following specific rules
45
Endpoint Detection and Response (EDR)
Tools that are more robust than HIDS and HIPS
46
Patching
Installing software security updates
47
Disabling ports/protocols
Closing unused ports and disabling unnecessary protocols
48
Application allow listing
Approving in advance only specific applications to run
49
Sandbox
A container in which an application can be run so that it does not impact the underlying OS