sec+ 601 Flashcards

1
Q

Someone who is pretending to be someone to gain trust is

A

impersonator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When an attacker tries to exploit your email to gain acces creditiditals

A

Phishing- email they try and gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is it called when the attacker changes the URL?

A

Typosquatting, prepend is the beggining being changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When the e-mail lies to yout to exploit emotions to click on the phising email.

A

Pre-text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

when attacker wants to take over a large group in phising

A

pharmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when clicking on the email and it takes you to another website that copies everything you type in.

A

redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attack ove rthe voice line it looks like a locoal phone number is calling but its not

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attacker entice you ckick a link through a text messga

A

smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

gather info on victim from social media linked in etc. to make up a pretext

A

reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an attack with inside information to make it more believable

A

targeted phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

spear fishing the CEO is also called

A

whaling it targets someone like a CFO who has all credited or valuable credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

often seen with vishing attackers will extract information from the victim

A

eliciting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

throwing away mail or any personal information in the trash attackers who do this can find it

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

people can look over your shoulder peaking with their eyes to see the information on the screen

A

shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a threat that doesn’t actually exist, but seem like they could be ex: needing to update software after typing to the wrong URL

A

hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

infect a third party site to victimize all its visit that visit the site

A

watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

layered defense helps what attack firewalls and IPS anti-virus/anti-malware signature updates

A

watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unsolicited messages emails forums can contain phishing attempt

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what helps filter spam before it goes to the internal server

A

mail gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

checks the ip address and makes sure its trusted if not it blocks the ip addres

A

reverse DNS rDNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

slows down the mail server to take a lot of time and also slows down their server

A

tarpitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

blcoks all recipent that are not

A

reciepient filerting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

sway the way people are thinking

A

hacking public campaign

24
Q

miltatry using the inteernt to sway

A

hybrid warfare

25
Q

when someone follows you inside righ after you walk in the door blending in with the crowd

A

tailgating

26
Q

attacker sneds an invoce for products you are using in teh organization

A

invoice scams

27
Q

attackers collecting login credentials mayb run a macro that downlaods all crednetials

A

credential harvest

28
Q

Malicious software that can gathers keystrokes, controls your computer by third-party and control the whole system.

A

Malware think of malicious + software= malware

29
Q

Malware can encrypt your data t/f

A

true

30
Q

Malware comes in e-mails, advertisements, webpages to download software t/f

A

true

31
Q

malware that can reproduce itself but needs user to click on something

A

virus

32
Q

worms can jump from machine to machine with out any human intervention

A

True

33
Q

anti-virus will prevent what

A

Viruses

34
Q

a type of cirus that is part of an application

A

program viru s

35
Q

all you have to do is start the OS and the virus will start

A

boot sector

36
Q

may act as a script on the OS

A

scritp virus

37
Q

a virus that is runnning inside another application

A

macor virus

38
Q

a virus that never installs or saves itself as visur son the file stem to avoid being known.

A

fileless virus

39
Q

What virus operates in the memory of the computer? Nothing is ever written on the storage drive

A

Fileless Virus

40
Q

what virus runs PowerShell scripts

A

Fileless scripts

41
Q

what virus connects to local systems or networks and multiply

A

worms

42
Q

what virus takes advantage of vulnerability OS or applications

A

worms

43
Q

firewalls and or IDS/IPS helps mitigate what virus

A

worms they help block the communication

44
Q

installs malware to encrypt data and then wants crypto currency in exchange

A

crypto-malware

45
Q

taking away data and required to pay for it back

A

ransomware

46
Q

using a back-up, updating your OS,applications and antivirus-anti-malware will help prevnt ransom and cryptoware

A

True

47
Q

software that pretends to be something else. doesn’t really replicate only ends up installing malware

A

Trojan horse

48
Q

overly aggressive browser toolbar

A

Potentially unwanted program PUP

49
Q

installs new software for a new way to enter the sytem often placed with malware

A

backdoor

50
Q

remote adminstration tool is also called what

A

Remote access Trojan RAT

51
Q

RATs conrols a device key logg screen record take screen shots copy files and embed more malware

A

true

52
Q

how to prevent agaisnt trojan and rats

A

dont run unkown software keep anti-virus and anti-,alwre up to date always have a back up

53
Q

What modifes parts of the kernal aka the foundational buldings blocks of the OS

A

Rootkits

54
Q

rootskits can be found on all operating devices

A

true

55
Q

what is an example of kernal drivers

A

Zeus/Zbot