Malware Notes Flashcards

1
Q

Software designed to harm devices or networks.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious code written to interfere with computer operations and cause damage to data and software.

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A manipulation technique that exploits human error to gain private information, access, or valuables.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

A

Business Email Compromise (BEC):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A form of spear phishing. Threat actors target company executives to gain access to sensitive data

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

A

Vishing:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

A

Smishing:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware that can duplicate and spread itself across systems on its own.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware that’s used to gather and sell information without consent

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.

A

Social Media Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A threat actor attacks a website frequently visited by a specific group of users

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network.

A

USB baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

A

Physical Social Engineering