Survey of Malicious Activities Flashcards
Which is a type of brute force attack where the attacker slowly performs brute force logins based on a list of usernames with default passwords on the application?
A. Downgrade
B. Spraying
C. Spoofing
D. Brute force
B. Spraying
Which popular form of malware encrypts key files and captures them until the victim pays the attackers in Bitcoin?
A. Firmware
B. Bloatware
C. Spyware
D. Ransomware
D. Ransomware
Which type of attack leverages a scenario when two different inputs can produce the same fingerprint or digest?
A. Side channel
B. Brute force
C. Collision
D. Downgrade
C. Collision
Which common form of DDoS attack involves a network of zombie systems and a master command and control (C&C) server to remotely control the victims?
A. Amplification attack
B. Cache Poisoning attack
C. Botnet attack
D. Extranet attack
C. Botnet attack
Which of these would be considered an indicator of compromise? Choose more than one option.
A. Logging to a SIEM system
B. Impossible to travel
C. Blocked content
D. High resource consumption
E. Concurrent session usage
F. Successful logins
B. Impossible to travel
C. Blocked content
D. High resource consumption
E. Concurrent session usage
Which physical attack uses devices that overlay an ATM machine or point-of-sale scanner to steal the information from the victim>
A. Spoofing
B. Skimming
C. Brute force
D. RFID cloning
B. Skimming
Which form of application attack changes a program’s execution path and overwrites elements of its memory, which amends the program’s execution path to damage existing files or expose data?
A. Buffer overflow
B. Credential replay
C. Directory traversal attack
D. Replay attacks
A. Buffer overflow