Test 1 Flashcards
Edie downloaded a game for her phone from the Google store. Bundled with the legitimate looking game, a separate piece of malware was also installed at the same time which uses her phone to mine cryptocurrency. Which of the following types of malware was secretly installed without her knowledge?
a
Match the following attacker types to their appropriate definitions.
Question
Script Kiddies
Hactivists
Nation State Actors
Insiders
a
When an attacker calls a target on the phone and pretends to be someone in authority, this is referred most specifically to as…
a
Which of the following attacker types is associated with attacks referred to as Advanced Persistent Threats (APTs)?
a
Which of the following is an asymmetric algorithm?
a
Match the malware types below to their appropriate definitions.
Question
Ransomware
Virus
Worm
Logic Bomb
a
Which of the following security tools is able to capture network packets and read unencrypted traffic?
a
The only people that should have access to Alice’s private key are Alice and Bob.
a
Which of the following is considered a bootable Linux operating system which comes pre-installed with a number of cyber security utilities such as Nmap, Wireshark and Metasploit?
a
Which of the following sites is MOST likely to be used in performing OSINT against a target organization in order to find out more information about the organization’s employees?
When viewing a Linux system’s encrypted password hash file, a value of $5$ indicates that the password is encrypted with SHA2. How long is the hash length for the password hashes in the Linux /etc/shadow file?
a
Match the following risk assessment terms with their appropriate definitions.
Question
Asset
Risk
Threat vector
Threat
a
Which of the Critical Security Controls would be essential in the event a company suffers from a ransomware attack?
a
Which of the following are considered hashing protocols? (pick all that apply)
a
Digital certificates are used to generate which of the following in order to perform asymmetric encryption?
a
Which of the following could be used to spread malware?
a