Lesson 13: Analyze Indicators of Malicious Activity Flashcards

1
Q

What are examples of virus types?

A

Non-resident/file infectors, memory-resident, boot sector, and script/macro-based viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What distinguishes worms from other malware?

A

Worms are self-replicating and can cause resource exhaustion (e.g., Code Red and Conficker).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does fileless malware operate?

A

It works in memory and often uses tools like PowerShell or WMI to evade detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of spyware and keyloggers?

A

They monitor user activity, capture keystrokes, and steal sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are backdoors and RATs used for?

A

A remote access Trojan (RAT) is a malware program that opens a backdoor, enabling administrative control over the victim’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do rootkits conceal their presence?

A

They operate with SYSTEM-level privileges and hide in processes, logs, or firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ransomware?

A

Malware that blocks access to data or systems, demanding payment for restoration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What distinguishes Crypto-Malware from regular ransomware?

A

Crypto-Malware encrypts files and requires a decryption key for recovery (ex. CryptoLocker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cryptojacking?

A

The unauthorized use of system resources for cryptocurrency mining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a logic bomb operate?

A

It triggers malicious actions based on specific conditions or events, lying dormant until those conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Indicators of Compromise (IoCs)

A

Residual signs of attacks linked to Tactics, Techniques, and Procedures (TTPs) cataloged in resources like the MITRE ATT&CK database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of physical attack risks?

A

Damage to hardware, power disruptions, or rogue devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is RFID cloning and skimming?

A

The creation of counterfeit access cards for unauthorized entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of attacks fall under DDoS?

A

SYN floods, reflected attacks, and amplified attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do On-Path attacks like ARP poisoning work?

A

They intercept or manipulate communications covertly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Command and Control (C2) do?

A

Covertly manages compromised hosts using beaconing and persistence.

17
Q

Describe a DNS attack

A

A DNS attack exploits vulnerabilities in the Domain Name System (DNS) to disrupt its functionality, redirect users to malicious websites, or gain unauthorized access to sensitive data.

18
Q

How is a DNS attack performed, and how what are indicators for spotting the attack?

A

Cache poisoning, rogue DNS resolvers, and exploiting domain resolution vulnerabilities.

Indicators include DNS lookup failures and spikes in anomalous traffic.

19
Q

What is a Rogue Access Point?

A

A rogue access point is an unauthorized wireless access point on a network.

Rogue APs can be deployed by legitimate users (e.g., employees) for convenience or by malicious actors to gain unauthorized access to the network.

20
Q

What is an Evil Twin attack?

A

An evil twin attack is a specific type of rogue access point that mimics a legitimate network to deceive users and intercept their data.

21
Q

How do disassociation and replay attacks impact wireless networks?

A

Disassociation attacks: Disconnect users from a network.

Replay attacks: Capture and reuse authentication data.

22
Q

What are examples of privilege escalation?

A

Vertical Escalation: Gaining SYSTEM or administrative privileges.

Horizontal Escalation: Accessing privileges or data meant for other users.

23
Q

What is a buffer overflow attack?

A

Exploiting poorly handled memory buffers for arbitrary code execution.

24
Q

What are examples of injection attacks?

A

SQL injection, LDAP injection, and XML External Entity (XXE) exploitation.

25
Q

How does CSRF differ from SSRF?

A

CSRF (Cross-Site Request Forgery): Exploits active sessions to perform unauthorized actions.

SSRF (Server-Side Request Forgery): Exploits server requests to compromise internal services.

26
Q

What insights can Web Server Logs provide?

A

HTTP status codes (e.g., 403, 502) can reveal access violations or server issues.

27
Q

What is the purpose of a URL Analysis?

A

To inspect encoded data and query parameters for obfuscated or malicious input.

28
Q

How is Percent Encoding used maliciously in URLs?

A

Although legitimate for Unicode or reserved characters, it can obfuscate malicious data.