Malware, Social Engineering and Threats Flashcards

1
Q

Describe what the acronyms below stand for and what they are:

  • DOS
  • DDOS
A

Both are methods to take down a Server

  • Denial Of Service - Uses a single source
  • Distributed Denial of Service - Uses multiple sources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the term Evil Twin?

A

A wireless access point (AP) that has the same name as a legit Wi-Fi AP nearby, used for intercepting traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the term XSS - Cross-Site Scripting?

A

A method of executing malicious code on an otherwise legitimate website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the following terms:

  • Phishing
  • Vishing
  • Whaling
A
  • Social Engineering via email
  • Social Engineering via phone (voice)
  • Phishing specifically for executives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Malware

A

Any malicious program that exists on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the CompTIA Malware Troubleshooting Method?

A
  1. Identify Symptoms
  2. Quarantine System
  3. Disable System Restore
  4. Remediate
  5. Schedule Scans and Updates
  6. Enable System Restore
  7. Educate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 8 types of Malwares?

A
  • Virus
  • Trojan
  • Worm
  • Botnet
  • Rootkit
  • KeyLogger
  • Ransomware
  • Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 9 types of Viruses and give a small description

A
  1. Armored - Difficult to analyze
  2. Boot Sector - Boots with OS
  3. Companion - Parasite to legit program
  4. Macro - Attachs Office Suite
  5. Multipartite - Multiple Forms
  6. Phage - Alters App/DB
  7. Polymorphic - Constantly changing
  8. Retrovirus - Attacks Anti-Virus
  9. Stealth - Avoids Detections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 3 statements that apply to the definition of a computer virus?

A
  • Attaches itself to an executable
  • Requires its host application to be running
  • Malicious Self-replicating program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malware exploits computing resources without the owner’s consent?

A

Cryptominer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides the most effective means for malware removal?

A

OS Reinstallation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 characteristics used to describe the characteristics of an on-path attack?

A
  • AKA Man-In-The-Middle Attack
  • Attackers place themselves in between 2 devices
  • Attackers intercept/modify packets between two devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 3 characteristics used to describe characteristics of an XSS attack?

A
  • Exploits trust between web browser and website
  • Malicious script injected into a trusted website
  • Browser executes attacker’s script
How well did you know this?
1
Not at all
2
3
4
5
Perfectly