Threat and attack terminology Flashcards

1
Q

Malicious software that gathers information, intercept personal data and make it available to third parties. Hes primary purposeis to display ads and generate revenue for the creator.

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol used to map known IP addresses to unkown physical address

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s address

A

ARP Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software that identifies the presence of Virus

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A virus that is protected in a way that makes dissasembiling it difficult.

A

Armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

involves the MAC (Media Access Control) address of the data being faked.

A

ARP spoofing commonly known as ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any unauthorized intrusion into the normal operations of a computer or computer network.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The area of an application that is available to users—those who are authenticated and, more importantly, those who are not.

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An opening left in a program application (usually by the

developer) that allows additional access to data.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An automated software program (network robot) that collects information on the web.In its malicious form, is a compromised computer being controlled remotely.

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of denial-of-service (DoS) attack that occurs when more data is put into a buffer than it can hold, thereby overflowing it

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Using multiple transparent or opaque layers to trick a user into clicking a button or link on another page when they had intended to click on the top page.

A

clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A virus that creates a new program that runs in the place

of an expected program of the same name.

A

companion virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A form of web-based attack in which unauthorized commands are sent from a user that a website trusts.

A

cross-site request forgery (XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Running a script routine on a user’s machine

from a website without their permission.

A

cross-site scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of attack that prevents any users—even

legitimate ones—from using a system.

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The act of attempting to crack passwords by testing them against a list of dictionary words.

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A derivative of a DoS attack in which

multiple hosts in multiple locations all focus on one target to reduce its availability to the public.

A

DDoS Distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An attack method in which a daemon caches DNS reply
packets, which sometimes contain other information (data used to fill the packets). The extra data can be scanned for information useful in a break-in or man-in-the-middle attack.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The DNS server is given information about a name server that it thinks is legitimate when it isn’t.

A

DNS Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The network service used in TCP/IP

networks that translates hostnames to IP addresses.

A

Domain Name System (DNS)

22
Q

Putting too much information into too small of a space that has been set aside for numbers.

A

Integer Overflow

23
Q

Making the data look as if it came from a trusted host when it didn’t

A

IP Spoofing

24
Q

A permission method in which users are granted only the privileges necessary to perform their job function.

A

least privilege

25
Q

The policy of giving a user only the minimum

permissions needed to do the work that must be done.

A

least privilege policy

26
Q

Any code that is hidden within an application and causes something unexpected to happen based on some criteria being met. For example, a programmer could create a program that always makes sure her name appears on the payroll roster; if it doesn’t, then key files begin to be
erased.

A

Logic bomb

27
Q

A software exploitation virus that works by using the macro feature included in many applications, such as Microsoft Office.

A

Macro Virus

28
Q

A threat from someone inside the organization

intent on doing harm.

A

insider threat

29
Q

An attack that occurs when someone/something that is

trusted intercepts packets and retransmits them to another party.

A

Man-in-the-middle

30
Q

A virus that attacks a system in more than one way.

A

multipartie virus

31
Q

A large Internet Control Message Protocol (ICMP) packet

sent to overflow the remote host’s buffer. Usually causes the remote host to reboot or hang.

A

Ping of Death

32
Q

An attribute of some viruses that allows them to mutate and appear differently each time they crop up. The mutations make it harder for virus scanners to detect (and react) to the viruses.

A

polymorphic

33
Q

The result when a user obtains access to a resource that

they wouldn’t normally be able to access.It can also be done purposefully by an attacker seeking full access.

A

Privilege escalation

34
Q

Software that demands payment before restoring the data or system infected.

A

ransomware

35
Q

An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection.

A

replay attack

36
Q

A virus that attacks or bypasses the antivirus software installed on a computer.

A

retrovirus

37
Q

A form of malware that tries to convince the user to pay for a fake threat.

A

rogueware

38
Q

Software program that has the ability to obtain root-level access and hide certain things from the operating system.

A

rootkit

39
Q

A small library that is created to intercept API calls transparently.

A

shim

40
Q

An attempt by someone or something to masquerade as

someone/something else.

A

spoofing

41
Q

Software programs that work—often actively—on behalf of a third party.

A

spyware

42
Q

A virus that attempts to avoid detection by masking itself from applications.

A

stealth virus

43
Q

Any application that masquerades as one thing in order to get past scrutiny and then does something malicious.

A

Trojan horse

44
Q

Creating domains that are based on the misspelling of

another.

A

typo squatting

45
Q

Registering domains that are similar to those for a known

entity but based on a misspelling or typographical error.

A

URL hijacking

46
Q

A program intended to damage a computer system.

A

Virus

47
Q

Identifying a site that is visited by those whom they

are targeting, poisoning that site, and then waiting for the results.

A

wathering hole attack

48
Q

An advanced attack that tries to get around detection and send a packet with every single option enabled.

A

Xmas attack

49
Q

An attack that begins the very day an exploit is discovered.

A

Zero day exploit

50
Q

Any system taking directions from a master control computer.

A

Zombie

51
Q

allows a remote user to access the system for the purpose of administering it. Although this can be extremely valuable for legitimate administration, improperly accessed it offers the opportunity to exploit powerful features of the operating system.

A

RAT - Remote Access Tool