lsw28598@email.vccs.edu Flashcards

study for SYO-501 sec+

1
Q

viruses

A

Virus is a specific type of malware by itself. It is a contagious piece of code that infects the other software on the host system and spreads itself once it is run. It is mostly known to spread when software is shared between computers. This acts more like a parasite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crypto-malware

A

Crypto-ransomware is a type of harmful program that encrypts files stored on a computer or mobile device in order to extort money. Encryption ‘scrambles’ the contents of a file, so that it is unreadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

worm

A

This type of malware will replicate itself and destroys information and files saved on the host PC. It works to eat up all the system operating files and data files on a drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan

A

Trojans are a type of virus that are designed to make a user think they are a safe program and run them. They may be programmed to steal personal and financial information, and later take over the resources of the host computer’s system files. In large systems, it may attempt to make a host system or network resource unavailable to those attempting to reach it. Example: you business network becoming unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkit

A

A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over a computer or other system. While there have been legitimate uses for this type of software, such as to provide remote end-user support, most rootkits open a backdoor on victim systems to introduce malicious software, such as viruses, ransomware, keylogger programs or other types of malware, or to use the system for further network security attacks. Rootkits often attempt to prevent detection of malicious software by endpoint antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

keylogger

A

a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

adware

A

software that automatically displays or downloads advertising material (often unwanted) when a user is online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

bots

A

self-propagating malware that infects its host and connects back to a central server(s). The server functions as a “command and control center” for a botnet, or a network of compromised computers and similar devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

Remote Access Trojan. malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

logic bomb

A

a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

backdoor

A

a feature or defect of a computer system that allows surreptitious unauthorized access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

social engineering attacks

A

phishing, spear phishing, whalinf, vishing, tailgating,impersonation, dumpster diving, shoulder surfing, watering hole attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

application/service attacks

A

Dos, Ddos, man-in-the-middle, buffer-overflow, injection, cross-site scripting, cross-site request forgery, privilege escalation, ARP poisoning, amplification, DNS poisoning, domain hijacking, man-in-the-browser,zero day, replay, pass the hash, hijacking, clickjacking, session highjacking, url hijacking, typo squatting, driver manipulation, shimming, refactoring, mac spoofing, ip spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DoS

A

denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ddos

A

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic.