Security / Malware Flashcards

1
Q

What type of authentication factor is something a user knows?

A

Knowledge Factor (Passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of authentication factor is something a user has?

A

Possession Factor (Smart Card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of authentication factor is something a user is?

A

Inherence Factor (Biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of social engineering technique cast a wide net and hopes to get some people to do it? (Spam Emails)

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of social engineering technique is similar to phishing but targets a smaller group?

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of social engineering technique attacks high ranking individuals (CEOs, VPs)?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of social engineering technique uses phone calls to get information? (Spam Calls)

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What social engineering technique involves someone (without access) walking into a secure door behind someone with access?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of social engineering technique involves someone watching over someone’s shoulder to see what they are doing? (Typing in a pin, a passcode, a password)

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of malware attaches itself to a program or file that a user must run or open?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malware attaches itself to a program or file and will spread from PC to PC without human interaction?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of malware appears to be useful software? (can be a delivery method for other malware types)

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of malware steals data and PII (Personal Identifiable Information) by capturing credit card/bank account information or login information?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of malware tracks browser history and downloads to display advertisements based on user trends (sometimes as pop-ups)?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of malware operates at the “root” level and is difficult to detect?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of malware encrypts specific files and hard drives to block access until a ransom is paid?

A

Ransomware

17
Q

What are 4 methods of malware prevention?

A

OS up to date, Reputable anti-virus/security software, Firewall, Safe internet browsing

18
Q

What is the 1st step in the CompTIA Malware Removal Process?

A

Identify - Research to determine if symptoms shown are from a malware infection

19
Q

What is the 2nd step in the CompTIA Malware Removal Process?

A

Quarantine - Pull network cable or disconnect from Wi-Fi to keep infection from spreading

20
Q

What is the 3rd step in the CompTIA Malware Removal Process?

A

Disable Restores - Keeps the infection from infecting restore points

21
Q

What is the 4th step in the CompTIA Malware Removal Process?

A

Remediate - Update anti-malware software, Use removal techniques, Run a scan in safe mode

22
Q

What is the 5th step in the CompTIA Malware Removal Process?

A

Scan and Update - Update signatures and scan to prevent future infections

23
Q

What is the 6th step in the CompTIA Malware Removal Process?

A

Restore Point - Enable system restores and create new restore point

24
Q

What is the 7th step in the CompTIA Malware Removal Process?

A

Educate User - Educate on proper internet and email usage to prevent future infections