Domain 1: Threats, Attacks, and Vulnerabilities Flashcards

1
Q

What is a virus?

A

A virus is a type of malware that attaches itself to a legitimate program or file and spreads to other files, causing damage or misusing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a worm?

A

A worm is a self-replicating malware that spreads independently across networks, exploiting vulnerabilities without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Trojan horse?

A

A Trojan horse is a type of malware that disguises itself as a legitimate application but performs malicious actions once executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ransomware?

A

Ransomware is a type of malware that encrypts the victim’s files and demands a ransom to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

Phishing is a social engineering attack where an attacker sends fraudulent emails or messages, attempting to trick individuals into providing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spear phishing?

A

Spear phishing is a targeted phishing attack aimed at a specific individual or organization, using personalized information to increase credibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is vishing?

A

Vishing (voice phishing) is a social engineering attack conducted over the phone, where the attacker attempts to trick the victim into revealing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a zero-day vulnerability?

A

A zero-day vulnerability is a software flaw that is unknown to the vendor and does not have a patch or fix available, making it susceptible to exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who are script kiddies?

A

Script kiddies are inexperienced hackers who use pre-written tools and scripts to launch attacks without a deep understanding of the underlying technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an advanced persistent threat (APT)?

A

An APT is a prolonged and targeted cyberattack where attackers gain access to a network and remain undetected for an extended period to steal data or cause disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly