Threats, Attacks, and Vulnerabilities 3 Flashcards
The trial software found exploits, but you need to buy the full package
Ransomware
More data is inserted into an application than expected
Buffer overflow
The reason why we shred and burn data is to prevent …
Dumpster diving
Someone standing behind you records your ATM transaction by using a smartphone
Shoulder surfing
A USB drive plugged into the back of your desktop logs keystrokes
Keylogger
This generates multiple popups
Adware
You have reinstalled the operating system, but this virus is still there
Rootkit
An attack on the CEO or a high‐level executive
Whaling
Someone willing to steal your trade secrets
Competitor
No knowledge or information is given to you
Black-box pen tester
Prevents pass-the-hash attacks
Kerberos
An untraceable virus
Zero‐day virus
May cause harm to your system
Intrusive scan
An attack on everyone using a popular trusted website
Watering-hole attack
Complete wireless payment transactions
Near field communication
Obtains a program from the dark web
Script kiddie
Redirects the user to a fraudulent website
DNS poisoning
Listening to a conversation
Passive reconnaissance
The first stage after purchasing an IoT device, change the …
Default configuration
CPU running at 100% is a sign of …
Resource exhaustion
An email sent to the Board of Directors
Spear phishing
Purchasing fake software from a website
Hoax
An attack using the phrase 1=1
SQL injection
Hacktivist motivation
Political cause
Prevents SQL injection, buffer overflow, and integer overflow
Input validation