Survey of Malicious Activities Flashcards

1
Q

Which is a type of brute force attack where the attacker slowly performs brute force logins based on a list of usernames with default passwords on the application?
A. Downgrade
B. Spraying
C. Spoofing
D. Brute force

A

B. Spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which popular form of malware encrypts key files and captures them until the victim pays the attackers in Bitcoin?
A. Firmware
B. Bloatware
C. Spyware
D. Ransomware

A

D. Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of attack leverages a scenario when two different inputs can produce the same fingerprint or digest?
A. Side channel
B. Brute force
C. Collision
D. Downgrade

A

C. Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which common form of DDoS attack involves a network of zombie systems and a master command and control (C&C) server to remotely control the victims?
A. Amplification attack
B. Cache Poisoning attack
C. Botnet attack
D. Extranet attack

A

C. Botnet attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these would be considered an indicator of compromise? Choose more than one option.
A. Logging to a SIEM system
B. Impossible to travel
C. Blocked content
D. High resource consumption
E. Concurrent session usage
F. Successful logins

A

B. Impossible to travel
C. Blocked content
D. High resource consumption
E. Concurrent session usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which physical attack uses devices that overlay an ATM machine or point-of-sale scanner to steal the information from the victim>
A. Spoofing
B. Skimming
C. Brute force
D. RFID cloning

A

B. Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which form of application attack changes a program’s execution path and overwrites elements of its memory, which amends the program’s execution path to damage existing files or expose data?
A. Buffer overflow
B. Credential replay
C. Directory traversal attack
D. Replay attacks

A

A. Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly