Malware, Social Engineering and Threats Flashcards
Describe what the acronyms below stand for and what they are:
- DOS
- DDOS
Both are methods to take down a Server
- Denial Of Service - Uses a single source
- Distributed Denial of Service - Uses multiple sources
What is the term Evil Twin?
A wireless access point (AP) that has the same name as a legit Wi-Fi AP nearby, used for intercepting traffic.
What is the term XSS - Cross-Site Scripting?
A method of executing malicious code on an otherwise legitimate website.
Describe the following terms:
- Phishing
- Vishing
- Whaling
- Social Engineering via email
- Social Engineering via phone (voice)
- Phishing specifically for executives
Describe Malware
Any malicious program that exists on the computer
What is the CompTIA Malware Troubleshooting Method?
- Identify Symptoms
- Quarantine System
- Disable System Restore
- Remediate
- Schedule Scans and Updates
- Enable System Restore
- Educate
What are 8 types of Malwares?
- Virus
- Trojan
- Worm
- Botnet
- Rootkit
- KeyLogger
- Ransomware
- Spyware
Name 9 types of Viruses and give a small description
- Armored - Difficult to analyze
- Boot Sector - Boots with OS
- Companion - Parasite to legit program
- Macro - Attachs Office Suite
- Multipartite - Multiple Forms
- Phage - Alters App/DB
- Polymorphic - Constantly changing
- Retrovirus - Attacks Anti-Virus
- Stealth - Avoids Detections
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
What are 3 statements that apply to the definition of a computer virus?
- Attaches itself to an executable
- Requires its host application to be running
- Malicious Self-replicating program
What type of malware exploits computing resources without the owner’s consent?
Cryptominer
What provides the most effective means for malware removal?
OS Reinstallation
What are 3 characteristics used to describe the characteristics of an on-path attack?
- AKA Man-In-The-Middle Attack
- Attackers place themselves in between 2 devices
- Attackers intercept/modify packets between two devices
Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?
SQL Injection
What are 3 characteristics used to describe characteristics of an XSS attack?
- Exploits trust between web browser and website
- Malicious script injected into a trusted website
- Browser executes attacker’s script