Threats, attacks, vulnerabilities Flashcards

1
Q

What is an indicator of compromise?

A

Artifacts observed that indicate with a high degree of confidence a computer intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

Malicious code that requires user interaction to install and replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crypto-malware/Ransomware

A

Malicious applications that SCARE or SCAM users into taking some type of ACTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crypto-malware/Ransomware creates a sense of what

A

A sense of urgeny to pay in order to get data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a worm?

A

Self replicating program that can spread w/o user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two types of worms

A

Network service worms

Mass mailing worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are network service worms?

A

Something in the network allows the worm to spead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trojan

A

Seemingly friendly software that contains hidden malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a remote access tool (RAT)

A

Allows attacker to upload/download files, watch webcams, turn on audio, keyloggers, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rootkit

A

installs itself at the os or kernel level to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malware is very difficult to get rid of?

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are rootkits difficult to get rid of?

A

It loads before the operating system loads, and can disable the anti virus and anti malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keylogger

A

Malicious application that once installed on a host can capture all keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

Malware that is installed on an infected machince to deliver ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

Malicious software that captures user activity and reports back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Botnets

A

Malicious code that infects large numbers of computers for large scale attacks on specific targets

17
Q

Which malware has a command and control center

A

botnets

18
Q

Logic bomb

A

Malicious code that triggers after a period time based on some date or specific activity. It can sit in waiting for a long time before launch

19
Q

Backdoors

A

Software that installs for the purpose of opening ports and installing additional software