Intro to Cybersecurity Chapter 2 Flashcards

1
Q

What are blended cyber attacks?

A

Blended attacks use multiple techniques to infiltrate and attack a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Buffer overflow?

A

This vulnerability occurs when data is written beyond the limits of a buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Non-validated input?

A

Forcing the program to behave in an unintended way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Race conditions?

A

This vulnerability is when the output of an event depends on ordered or timed outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Ransomware?

A

This malware is designed to hold a computer system or the data it contains captive until a payment is made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Scareware?

A

This is a type of malware designed to persuade the user to take a specific action based on fear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Rootkit?

A

This malware is designed to modify the operating system to create a backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Virus?

A

A virus is malicious executable code that is attached to other executable files, often legitimate programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Trojan horse?

A

A Trojan horse is malware that carries out malicious operations under the guise of a desired operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Worms?

A

Worms are malicious code that replicate themselves by independently exploiting vulnerabilities in networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Man-In-The-Middle (MitM) attack?

A

MitM allows the attacker to take control over a device without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Man-In-The-Mobile (MitMo) attack?

A

A variation of man-in-middle, MitMo is a type of attack used to take control over a mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spyware?

A

This malware is design to track and spy on the use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Adware?

A

Advertising supported software is designed to automatically deliver advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Bot.

A

From the word robot, a bot is malware designed to automatically perform action, usually online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the symptoms of Malware?

A
  • There is an increase in CPU usage.
  • There is a decrease in computer speed.
  • The computer freezes or crashes often.
  • There is a decrease in Web browsing speed.
  • There are unexplainable problems with network connections.
  • Files are modified.
  • Files are deleted.
  • There is a presence of unknown files, programs, or desktop icons.
  • There are unknown processes running.
  • Programs are turning off or reconfiguring themselves.
  • Email is being sent without the user’s knowledge or consent.
17
Q

What is Social Engineering?

A

Social engineering is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information

18
Q

What is pretexting?

A

This is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data.

19
Q

What is tailgating?

A

This is when an attacker quickly follows an authorized person into a secure location.

20
Q

What is quid pro quo?

A

This is when an attacker requests personal information from a party in exchange for something,

21
Q

What are three methods of Wi-fi password cracking?

A
  1. Social engineering
  2. Brute-Force attacks
  3. Network sniffing
22
Q

What are brute-force attack tools?

A

Ophcrack, L0phtCrack, THC Hydra, RainbowCrack, and Medusa.

23
Q

What is Phishing?

A

Phishing is when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.

24
Q

What is spear phishing?

A

Spear phishing is a highly targeted phishing attack. While phishing and spear phishing both use emails to reach the victims, spear phishing emails are customized to a specific person.

25
Q

What are the four steps of exploitation?

A

Step 1. Gather information about the target system.
Step 2.One of the pieces of relevant information learned in step
Step 3. When the target’s operating system and version is known, the attacker looks for any known vulnerabilities
Step 4. When a vulnerability is found, the attacker looks for a previously written exploit to use.

26
Q

What is an Advanced Persistent Threat?

A

They consist of a multi-phase, long term, stealthy and advanced operation against a specific target.

27
Q

What is a Denial-of-Service (DoS) attack?

A

A DoS attack results in some sort of interruption of network service to users, devices, or applications.

28
Q

What are the two types of DoS Attacks?

A

Overwhelming Quantity of Traffic

Maliciously Formatted Packets

29
Q

What is a DDoS?

A

A Distributed DoS Attack (DDoS) is similar to a DoS attack but originates from multiple, coordinated sources.

30
Q

What is SEO Poisoning?

A

The most common goal of SEO poisoning is to increase traffic to malicious sites that may host malware or perform social engineering.

31
Q

What is a blended attack?

A

Blended attacks are attacks that use multiple techniques to compromise a target.

32
Q

What are examples of blended attacks?

A

Nimbda, CodeRed, BugBear, Klez and Slammer

33
Q

What is Impact Reduction?

A

Reducing the impact of a data breach to lessen the impact of stolen data, damaged databases, or damage to intellectual property, and the company’s reputation.