CS2610 Module 2 Types of Cyber Attacks and Malicious Code Flashcards

1
Q

Advanced Persistent Threat/APT

A

Cyber Attack. A network attack in which an unauthorized person gains access to a network and remains undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor

A

Cyber Attack. Method of bypassing normal authentication and gaining access to an OS or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Buffer Overflow

A

Cyber Attack. An exploit that takes advantage of the program that is waiting for a user’s input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Man-in-the-middle Attack

A

Cyber Attack. Intercepts and relays messages between two parties who are communicating directly with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cross-Site Scripting (XSS)

A

Cyber Attack. A code injection attack that allows an attacker to execute malicious JS in another user’s browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of Service Attack

A

Cyber Attack. An attempt to prevent the authorized users from accessing the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL injection

A

Cyber Attack. Commonly exploited web app vulnerability that allows the malicious stealing from and altering of a website’s database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero-day exploit

A

Cyber Attack. A vulnerability in a system or device that has been disclosed but is not yet patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

Malicious Code. Software program which, upon execution, replicates itself by modifying other programs and inserting its own code. Requires human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Worm

A

Malicious Code. Standalone malware which replicates itself in order to spread to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan Horse

A

Malicious Code. Program that claims to remove viruses, but actually introduces them to your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Botnet

A

Malicious Code. Used to perform DDoS attack, steal data, send spam, and allow attacker access to the device and its connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keylogger

A

Malicious Code. A type of surveillance tech used to monitor and record every keystroke types on a computer’s keyboard. Can log passwords, bank info, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rootkit

A

Malicious Code. A collection of tools or programs that enable administrator-level access to a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

Malicious Code. Software hidden from the user in order to gather info about internet interaction, keystrokes, passwords, and valuable data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adware

A

Malicious Code. Designed to display ads on your computer and redirect search requests to collect marketing data about you.

17
Q
A