Security+ 1.2 Prof. Messer Flashcards

1
Q

What are the malware types and methods?

A
  1. Virus
  2. Worm
  3. Trojan
  4. Spyware/Adware
  5. Ransomware
  6. Cryptomalware
  7. Botnet
  8. Key Logger
  9. Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Drive-by Download

A

An unintentional download of malware by taking advantage of a browser or app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Virus?

A

Malware that can reproduce itself through file systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the virus types?

A
  1. Program Virus
  2. Boot Sector Virus
  3. Script Virus
  4. Macro Virus
  5. Fileless Virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Boot Sector Virus?

A

A virus that exists in the boot sector of a storage device. When a computer is booted, the virus is launched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Script Virus?

A

Virus that operates as a script in your system. Exists in the operating system or browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Macro Virus?

A

Similar to a script virus, usually runs within applications (most commonly Microsoft Office apps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Fileless Virus?

A

A virus that installs itself into the computer memory (or RAM), uses native or built-in tools to execute a cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Worm?

A

Malware that can reproduce itself without any human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Ransomware?

A

A form of malware that locks a user from a system or personal data until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Cryptomalware

A

A newer generation of ransomware; encrypts the victim’s data until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two ways to circumvent ransomware attacks?

A
  • Have your data backed up on an online platform
  • Don’t click any fishy links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Trojan Horse?

A

Software that pretends to be helpful in order to conquer your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a PUP?

A

Potentially Unwanted Program; A software program that’s often installed with other software. This software can be potentially undesirable and annoying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a backdoor?

A

An access point in a system or encrypted data that bypasses its security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a RAT?

A

Remote Access Trojan (or remote administration tool); software designed to give the attacker remote access to an infected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a rootkit?

A

A collection of malicious computer software designed to enable access to a computer without detection.

18
Q

What is the kernel?

A

The core components of an operating system. Manages the operations of a computer and its software.

19
Q

What is Adware?

A

A type of malicious software that displays unwanted ads and pop-ups.

20
Q

What is Spyware?

A

A form of malware that collects personal data without consent.

21
Q

What is a keylogger?

A

Software or hardware used by a malicious attacker to record keystrokes from a system.

22
Q

What is a bot?

A

A self-propagating malware that infects a host and connects back to a central server (C&C or C2 servers)

23
Q

What are some ways your computer can get infected by a bot?

A

A trojan horse, or other forms of malware, or a vulnerability in the operating system or application.

24
Q

What is a botnet?

A

A collection of systems infected by the same malware that connects to a centralized server.

25
Q

What are some ways an attacker utilizes a botnet?

A
  1. Perform Distributed Denial of Service attacks
  2. Relay Spam
  3. Proxy network traffic (developing gateways for more malware)
  4. Other distributed computing tasks
26
Q

What are some ways rootkits can be removed or avoided?

A
  1. Anti-malware scans
  2. Use a remover specific to the rootkit
  3. Secure boot with UEFI (Unified Extensible Firmware Interface) - A security feature in modern bios systems that checks the kernel of a system to make sure there are no changes before the boot
27
Q

What is a logic bomb?

A

A piece of code that sets off a malicious function when a specified condition is met.

28
Q

Define hashing a password

A

The process of changing the format of any given key or string into another value

29
Q

What is a spraying attack?

A

A type of brute force attack where an attacker will use a single common password or username across multiple accounts to try and gain access.

30
Q

What is a brute force attack?

A

A type of attack where a user will try every possible password combination until the hash is matched.

31
Q

How does a brute force attack online vs. offline differ?

A

Brute force attacks- Online
- Very Slow
- Accounts lockout after a number of failed attempts

Brute force attacks- Offline
- The attacker has access to a hash and tries different keys without the risk of discovery

32
Q

What is a dictionary attack?

A

A type of brute force attack that involves using a wordlist/dictionary to find common passwords.

33
Q

What is a rainbow table?

A

An optimized, pre-built set of hashes used to save time during a password attack.

34
Q

Define “adding some salt” to a password hash

A

The process of adding random bits of data to a password before it gets hashed in order to prevent a password breach

35
Q

Define Skimming

A

Stealing credit card information during a transaction (usually with hardware).

36
Q

Define Card Cloning

A

Using details obtained from a skimming attack to make a physical copy of a card.

37
Q

What is ML (Machine Learning)

A

A branch of AI that focuses on the use of data and algorithms to imitate the way that humans learn.

38
Q

What are some ways that machine learning is implemented in everyday life?

A
  • Spam filtering emails
  • Recommending products from online retailers
  • Movie/Video recommendations on streaming platforms
  • Preventing car accidents in smart cars.
39
Q

What does it mean to Poison the training data of an AI?

A

Confusing the AI by sending modified training data that causes the AI to behave incorrectly.

40
Q

What is a birthday attack?

A

A brute force attack that exploits the exponentially growing probability of collision.

41
Q

What is a downgrade attack?

A

An attack in which the attacker downgrades a communication or a system to a weaker version or protocol.