Malware And Social Threats Flashcards

1
Q

What is malware?

A

Malware is software designed to disrupt, damage, or gain unauthorized access to computer systems.

Malware encompasses various types of malicious software, including viruses, worms, and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Trojan.

A

A Trojan is a type of malware that disguises itself as legitimate software to trick users into installing it.

Trojans can create backdoors for attackers to exploit a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a rootkit?

A

A rootkit is a collection of tools that allows unauthorized users to gain control of a computer system without being detected.

Rootkits can modify the operating system to hide their presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

A virus is a type of malware that attaches itself to a legitimate program and spreads to other programs and files.

Viruses can corrupt or delete data, and they often require user action to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define spyware.

A

Spyware is a type of malware that secretly monitors user activity and collects personal information.

Spyware can track browsing habits and gather sensitive data without user consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware?

A

Ransomware is malware that encrypts the victim’s files and demands payment for the decryption key.

Ransomware can cause significant data loss and financial damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a keylogger?

A

A keylogger is a type of spyware that records keystrokes to capture sensitive information such as passwords.

Keyloggers can be used for identity theft and other malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a boot sector virus?

A

A boot sector virus infects the master boot record of a hard drive, allowing it to execute before the operating system loads.

These viruses can be particularly damaging as they can prevent the system from booting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are cryptominers?

A

Cryptominers are programs that use system resources to mine cryptocurrencies without the user’s consent.

Cryptominers can significantly slow down system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List some tools and methods for detecting and preventing malware.

A
  • Antivirus
  • Anti-malware
  • Software firewalls
  • Recovery mode
  • Anti-phishing training
  • User education regarding common threats
  • OS reinstallation

These tools and methods help enhance system security and reduce the risk of malware infections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of recovery mode?

A

Recovery mode is used to troubleshoot and repair a malfunctioning operating system or to restore it to a previous state.

Recovery mode can be essential for removing persistent malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: User education plays a role in preventing malware infections.

A

True

Educating users about common threats and safe practices can significantly reduce the risk of malware infiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: _______ is a type of malware that encrypts files and demands payment for the decryption key.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is social engineering?

A

A manipulation technique that exploits human psychology to gain confidential information or access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the main types of phishing?

A

Phishing and vishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is shoulder surfing?

A

The act of observing someone’s screen or keyboard to obtain sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is whaling in the context of social engineering?

A

A type of phishing that targets high-profile individuals or executives.

19
Q

What is tailgating?

A

An unauthorized person following an authorized individual into a secure area.

20
Q

What is impersonation in social engineering?

A

Pretending to be someone else to gain access to information or systems.

21
Q

What is dumpster diving?

A

Searching through trash to find sensitive information.

22
Q

What is an evil twin attack?

A

A fraudulent Wi-Fi network that mimics a legitimate one to steal information.

23
Q

What is a distributed denial of service (DDoS) attack?

A

An attack that overwhelms a target with traffic from multiple sources.

24
Q

What is a denial of service (DoS) attack?

A

An attack that aims to make a service unavailable by overwhelming it with requests.

25
Q

What is a zero-day attack?

A

An attack that exploits a previously unknown vulnerability in software.

26
Q

What is spoofing?

A

Falsifying the origin of communication to deceive the recipient.

27
Q

What is an on-path attack?

A

An attack where the attacker intercepts communication between two parties.

28
Q

What is a brute-force attack?

A

A method of trial and error used to guess passwords or encryption keys.

29
Q

What is a dictionary attack?

A

A method of password cracking that uses a list of likely passwords.

30
Q

What is an insider threat?

A

A risk posed by individuals within an organization, such as employees or contractors.

31
Q

What is SQL injection?

A

A code injection technique that exploits security vulnerabilities in applications using SQL.

32
Q

What is cross-site scripting (XSS)?

A

A security vulnerability that allows an attacker to inject malicious scripts into web pages.

33
Q

What are common vulnerabilities in systems?

A

Non-compliant systems, unpatched systems, unprotected systems, EOL OSs, and BYOD.

34
Q

Fill in the blank: _______ is the practice of using personal devices for work purposes.

A

Bring your own device (BYOD)

35
Q

What are the three components of the Information Security CIA triad?

A

Confidentiality, integrity, availability

The CIA triad is a model designed to guide policies for information security within an organization.

36
Q

What is cybersecurity?

A

The practice of protecting systems, networks, and programs from digital attacks

Cybersecurity aims to reduce the risk of attacks and protect data integrity.

37
Q

What are security assessments?

A

Evaluations of security measures and vulnerabilities in an organization

Security assessments help identify weaknesses and improve security protocols.

38
Q

Define vulnerability in the context of information security.

A

A weakness in a system that can be exploited by threats

Vulnerabilities can arise from software bugs, misconfigurations, non compliant systems, unprotected systems, unpatched,byod

39
Q

Differentiate between internal and external threats.

A

Internal threats originate from within the organization; external threats come from outside

Both types of threats can be malicious or accidental.

40
Q

How is risk calculated in information security?

A

Risk = Impact * Likelihood

This formula helps organizations assess and prioritize potential security risks.

41
Q

Spear phishing

A

Attacker knows convincing information to email and get more information

42
Q

An information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems

A

Footprinting threats

43
Q

a specific type of spoofing where the threat actor covertly intercept traffic between 2 hosts and networks. This allows the threat actor to read the modified packets, often designed to recover password hashes.

A

On path attack

44
Q

Short rep of data thats A crypto graphic attack to takes any amount of data as input and produces a fixed length value as output