Security+ 1.2 Prof. Messer Flashcards

1
Q

What are the malware types and methods?

A
  1. Virus
  2. Worm
  3. Trojan
  4. Spyware/Adware
  5. Ransomware
  6. Cryptomalware
  7. Botnet
  8. Key Logger
  9. Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Drive-by Download

A

An unintentional download of malware by taking advantage of a browser or app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Virus?

A

Malware that can reproduce itself through file systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the virus types?

A
  1. Program Virus
  2. Boot Sector Virus
  3. Script Virus
  4. Macro Virus
  5. Fileless Virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Boot Sector Virus?

A

A virus that exists in the boot sector of a storage device. When a computer is booted, the virus is launched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Script Virus?

A

Virus that operates as a script in your system. Exists in the operating system or browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Macro Virus?

A

Similar to a script virus, usually runs within applications (most commonly Microsoft Office apps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Fileless Virus?

A

A virus that installs itself into the computer memory (or RAM), uses native or built-in tools to execute a cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Worm?

A

Malware that can reproduce itself without any human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Ransomware?

A

A form of malware that locks a user from a system or personal data until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Cryptomalware

A

A newer generation of ransomware; encrypts the victim’s data until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two ways to circumvent ransomware attacks?

A
  • Have your data backed up on an online platform
  • Don’t click any fishy links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Trojan Horse?

A

Software that pretends to be helpful in order to conquer your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a PUP?

A

Potentially Unwanted Program; A software program that’s often installed with other software. This software can be potentially undesirable and annoying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a backdoor?

A

An access point in a system or encrypted data that bypasses its security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a RAT?

A

Remote Access Trojan (or remote administration tool); software designed to give the attacker remote access to an infected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a rootkit?

A

A collection of malicious computer software designed to enable access to a computer without detection.

18
Q

What is the kernel?

A

The core components of an operating system. Manages the operations of a computer and its software.

19
Q

What is Adware?

A

A type of malicious software that displays unwanted ads and pop-ups.

20
Q

What is Spyware?

A

A form of malware that collects personal data without consent.

21
Q

What is a keylogger?

A

Software or hardware used by a malicious attacker to record keystrokes from a system.

22
Q

What is a bot?

A

A self-propagating malware that infects a host and connects back to a central server (C&C or C2 servers)

23
Q

What are some ways your computer can get infected by a bot?

A

A trojan horse, or other forms of malware, or a vulnerability in the operating system or application.

24
Q

What is a botnet?

A

A collection of systems infected by the same malware that connects to a centralized server.

25
What are some ways an attacker utilizes a botnet?
1. Perform Distributed Denial of Service attacks 2. Relay Spam 3. Proxy network traffic (developing gateways for more malware) 4. Other distributed computing tasks
26
What are some ways rootkits can be removed or avoided?
1. Anti-malware scans 2. Use a remover specific to the rootkit 3. Secure boot with UEFI (Unified Extensible Firmware Interface) - A security feature in modern bios systems that checks the kernel of a system to make sure there are no changes before the boot
27
What is a logic bomb?
A piece of code that sets off a malicious function when a specified condition is met.
28
Define hashing a password
The process of changing the format of any given key or string into another value
29
What is a spraying attack?
A type of brute force attack where an attacker will use a single common password or username across multiple accounts to try and gain access.
30
What is a brute force attack?
A type of attack where a user will try every possible password combination until the hash is matched.
31
How does a brute force attack online vs. offline differ?
Brute force attacks- Online - Very Slow - Accounts lockout after a number of failed attempts Brute force attacks- Offline - The attacker has access to a hash and tries different keys without the risk of discovery
32
What is a dictionary attack?
A type of brute force attack that involves using a wordlist/dictionary to find common passwords.
33
What is a rainbow table?
An optimized, pre-built set of hashes used to save time during a password attack.
34
Define "adding some salt" to a password hash
The process of adding random bits of data to a password before it gets hashed in order to prevent a password breach
35
Define Skimming
Stealing credit card information during a transaction (usually with hardware).
36
Define Card Cloning
Using details obtained from a skimming attack to make a physical copy of a card.
37
What is ML (Machine Learning)
A branch of AI that focuses on the use of data and algorithms to imitate the way that humans learn.
38
What are some ways that machine learning is implemented in everyday life?
- Spam filtering emails - Recommending products from online retailers - Movie/Video recommendations on streaming platforms - Preventing car accidents in smart cars.
39
What does it mean to Poison the training data of an AI?
Confusing the AI by sending modified training data that causes the AI to behave incorrectly.
40
What is a birthday attack?
A brute force attack that exploits the exponentially growing probability of collision.
41
What is a downgrade attack?
An attack in which the attacker downgrades a communication or a system to a weaker version or protocol.