Test 1 Flashcards
Edie downloaded a game for her phone from the Google store. Bundled with the legitimate looking game, a separate piece of malware was also installed at the same time which uses her phone to mine cryptocurrency. Which of the following types of malware was secretly installed without her knowledge?
a
Match the following attacker types to their appropriate definitions.
Question
Script Kiddies
Hactivists
Nation State Actors
Insiders
a
When an attacker calls a target on the phone and pretends to be someone in authority, this is referred most specifically to as…
a
Which of the following attacker types is associated with attacks referred to as Advanced Persistent Threats (APTs)?
a
Which of the following is an asymmetric algorithm?
a
Match the malware types below to their appropriate definitions.
Question
Ransomware
Virus
Worm
Logic Bomb
a
Which of the following security tools is able to capture network packets and read unencrypted traffic?
a
The only people that should have access to Alice’s private key are Alice and Bob.
a
Which of the following is considered a bootable Linux operating system which comes pre-installed with a number of cyber security utilities such as Nmap, Wireshark and Metasploit?
a
Which of the following sites is MOST likely to be used in performing OSINT against a target organization in order to find out more information about the organization’s employees?
When viewing a Linux system’s encrypted password hash file, a value of $5$ indicates that the password is encrypted with SHA2. How long is the hash length for the password hashes in the Linux /etc/shadow file?
a
Match the following risk assessment terms with their appropriate definitions.
Question
Asset
Risk
Threat vector
Threat
a
Which of the Critical Security Controls would be essential in the event a company suffers from a ransomware attack?
a
Which of the following are considered hashing protocols? (pick all that apply)
a
Digital certificates are used to generate which of the following in order to perform asymmetric encryption?
a
Which of the following could be used to spread malware?
a
Which of the following types of malware most specifically pops up advertisements, malicious and/or non-malicious, on a target’s screen?
Adware
Match the below cryptography terms to their most appropriate definitions.
Question
Hashing Algorithm
Symmetric Algorithm
Asymmetric Algorithm
Caesar Algorithm
a
Which of the following is the term used to refer to unencrypted text when discussing cryptography?
a
As a publicly traded organization within the United States, your company must adhere to which compliance regulation?
a
Malware researchers have determined that the Dawgs malware was created several months ago, but only recently discovered in the wild by an independent malware researcher. The malware spreads via phishing and installs malicious browser extensions in order to steal bank account credentials. It is not believed to be a tool for the governments such as North Korea to raise funds.
What type of group is more than likely responsible for the Dawgs malware?
Organized crime
Which of the following malware payloads most specifically records every key an infected user presses on their keyboard?
key logger
Which of the following is the most popular method for attackers to gain access to an organization’s internal network?
a
The hash length of MD5 is 128 bits.
True