Security / Malware Flashcards
What type of authentication factor is something a user knows?
Knowledge Factor (Passwords)
What type of authentication factor is something a user has?
Possession Factor (Smart Card)
What type of authentication factor is something a user is?
Inherence Factor (Biometrics)
What kind of social engineering technique cast a wide net and hopes to get some people to do it? (Spam Emails)
Phishing
What kind of social engineering technique is similar to phishing but targets a smaller group?
Spear Phishing
What type of social engineering technique attacks high ranking individuals (CEOs, VPs)?
Whaling
What type of social engineering technique uses phone calls to get information? (Spam Calls)
Vishing
What social engineering technique involves someone (without access) walking into a secure door behind someone with access?
Tailgating
What type of social engineering technique involves someone watching over someone’s shoulder to see what they are doing? (Typing in a pin, a passcode, a password)
Shoulder Surfing
What type of malware attaches itself to a program or file that a user must run or open?
Virus
What type of malware attaches itself to a program or file and will spread from PC to PC without human interaction?
Worm
What type of malware appears to be useful software? (can be a delivery method for other malware types)
Trojan
What type of malware steals data and PII (Personal Identifiable Information) by capturing credit card/bank account information or login information?
Spyware
What type of malware tracks browser history and downloads to display advertisements based on user trends (sometimes as pop-ups)?
Adware
What type of malware operates at the “root” level and is difficult to detect?
Rootkit
What type of malware encrypts specific files and hard drives to block access until a ransom is paid?
Ransomware
What are 4 methods of malware prevention?
OS up to date, Reputable anti-virus/security software, Firewall, Safe internet browsing
What is the 1st step in the CompTIA Malware Removal Process?
Identify - Research to determine if symptoms shown are from a malware infection
What is the 2nd step in the CompTIA Malware Removal Process?
Quarantine - Pull network cable or disconnect from Wi-Fi to keep infection from spreading
What is the 3rd step in the CompTIA Malware Removal Process?
Disable Restores - Keeps the infection from infecting restore points
What is the 4th step in the CompTIA Malware Removal Process?
Remediate - Update anti-malware software, Use removal techniques, Run a scan in safe mode
What is the 5th step in the CompTIA Malware Removal Process?
Scan and Update - Update signatures and scan to prevent future infections
What is the 6th step in the CompTIA Malware Removal Process?
Restore Point - Enable system restores and create new restore point
What is the 7th step in the CompTIA Malware Removal Process?
Educate User - Educate on proper internet and email usage to prevent future infections