Threats, Attacks, and Vulnerabilities 3 Flashcards

1
Q

The trial software found exploits, but you need to buy the full package

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

More data is inserted into an application than expected

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The reason why we shred and burn data is to prevent …

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A USB drive plugged into the back of your desktop logs keystrokes

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have reinstalled the operating system, but this virus is still there

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Someone standing behind you records your ATM transaction by using a smartphone

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This generates multiple popups

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

No knowledge or information is given to you

A

Black-box pen tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An untraceable virus

A

Zero‐day virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Someone willing to steal your trade secrets

A

Competitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attack on the CEO or a high‐level executive

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Prevents pass-the-hash attacks

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

May cause harm to your system

A

Intrusive scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack on everyone using a popular trusted website

A

Watering-hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Complete wireless payment transactions

A

Near field communication
(NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Obtains a program from the dark web

A

Script kiddie

17
Q

Redirects the user to a fraudulent website

A

DNS poisoning

18
Q

Listening to a conversation

A

Passive reconnaissance

19
Q

The first stage after purchasing an IoT device, change the …

A

Default configuration

20
Q

CPU running at 100% is a sign of …

A

Resource exhaustion

21
Q

An email sent to the Board of Directors

A

Spear phishing

22
Q

An attack using the phrase 1=1

A

SQL injection

23
Q

Purchasing fake software from a website

A

Hoax

24
Q

Hacktivist motivation

A

Political cause

25
Q

Prevents SQL injection, buffer overflow, and integer overflow

A

Input validation