Module 3: Threats & Attacks on Endpoints Q Flashcards
What does ransomware do to an endpoint device?
Ransomware attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded
Ransomware is an imprison malware that takes control of the endpoint device, affecting the device’s performance until the user pays a ransom to the attacker
The files in James’s computer were found spreading within the device without any human action. As an engineer, you were requested to identify the problem and help James resolve it. During file code inspection, you noticed that certain types of files in the computer have similar codes.
You found that the problem is coming from a set of codes that are not part of the actual files, appended at the bottom of the file. You also noticed a transfer control code written at the beginning of the files giving control to the code at the bottom of the file.
Which type of infection is this a characteristic of?
This is a typical characteristic of an endpoint device infected with a file-based virus attack
This is a characteristic of a typical early generation file-based virus, where the malicious code is attached at the bottom of the file, and the control is transferred from the beginning of the file through a control transfer code in the file
Juan, a cybersecurity expert, has been hired by an organization whose networks have been compromised by a malware attack. After analyzing the network systems, Juan submits a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files.
Which malware attack is Juan reporting?
Virus
Split infection technique is characteristic of a type of virus that lodges malicious codes in multiple locations within the file. It is normally placed randomly in various parts of the infected file
Which of the following is a feature of a fileless virus?
Fileless viruses are easy to detect
Since living off the land binaries (LOLBins) infect a computer’s system files, they are difficult to detect, unlike the file viruses that can be detected using a good antivirus application on the device
Japan’s cybercrime control center noticed that around 200,000 Tokyo computers are infected by bots, and all these bots are remotely controlled by a single attacker. What is this attacker referred to as?
Bot herder
A bot herder is the administrator or controller of the logical network of all devices infected by the attacker-created bots. In most cases, the device user is unaware of the bot herder’s influence on the endpoint
Which of the following statements correctly describes the disadvantage of a hardware-based keylogger?
A hardware-based keylogger must be physically installed and removed without detection
Since hardware-based keyloggers need to be physically connected to and removed from the endpoint, the attacker is vulnerable to being detected and apprehended
Kate decides to download an extension to her favorite browser to quickly store links on her spreadsheet software. While downloading the software, she ignores the opt-out check box that allows the extension to download a search toolbar.
What has occurred here?
Kate has installed a potentially unwanted program (PUP)
An additional program was installed along with the program Katie intended to install because she overlooked the opt-out check box
Shanise is an IT security professional for a large private bank. She got an alert that the bank website received a funds transfer request that was correctly credentialed but flagged as being out of the account owner’s usual pattern. If the alert is correct, what type of attack has likely occurred?
CSRF attack
A cross-site request forgery (CSRF) is an attack that uses a website’s authentication tokens to “inherit” a victim’s credentials and privileges, allowing the attacker to impersonate the authorized user
Kia recently noticed that when she browses her favorite online shopping site, she is immediately redirected to a competitor’s site. What is happening here, and what is the best option for Kia to fix this situation?
Kia must uninstall the toolbar software and the accompanying components she has recent installed on her browser
Uninstalling the software and related components will remove the accidentally installed potentially unwanted program (PUP) from the device
Which of the following is an example of a request forgery malware?
CSRF
A cross-site request forgery (CSRF) is a vulnerability that induces users to perform unintended actions using the authentication token sent by the website to the user’s browser
While Andel is logging into his email through a browser, the login window disappears. Andel attempts to log in again and is successful. Days later, he goes to log into his email, and his attempt fails. He receives a message indicating that his username and/or password are invalid.
What is Andel likely a victim of?
CSRF
Cross-site request forgeries (CSRF) trick users who have authenticated “tokens” on a specific website into loading another, malicious, webpage that then inherits (steals) the user’s identity and privileges. The stolen credentials can then be used to perform functions on the attacker’s behalf; in this case, changing Andel’s email credentials so only the attacker can access his account
Which of the following is a form of malware attack that uses specialized communication protocols?
RAT
RAT has the functionality of a Trojan while also using specialized communication protocols that allow unauthorized access to the entire infected system
Which of the following describes the action of an SQL injection into a database server?
The SQL injection inserts specially created structured query language statements to manipulate the database server, giving control of the database to the attacker, who can then manipulate the database
SQL injections insert specially created SQL statements to manipulate a database into giving control to the attacker
What is a risk to data when training a machine learning (ML) application?
Tainted training data for machine learning
Attackers can alter the training data that the machine learning application is training with to give false negatives to cloak themselves
Which of the following is a subset of artificial intelligence?
Machine learning
Machine learning is a subset of artificial intelligence