Type Of Attack Indicators Flashcards

1
Q

Software that has been designed for some nefarious purpose. Such software can be designed to cause damage to a system, such as by deleting all files, or it can be designed to create a back door into the system to grant access to unauthorized individuals

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Form of malware that locks the user out of their files, or even the entire device until an online Ransom payment is made to restore access 

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A piece of software that appears to do one thing, and may, in fact actually do that thing, but hide some other functionality

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acts like a virus, but also have the ability to travel without human action they do not need help to spread

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A designation used by security companies and antivirus vendors to identify programs that may have adverse effects on a computer security and privacy. The software can exhibit some very undesired characteristics, such as the following, slowing down your computer, displaying a ton of annoying ads, adding toolbars that steal space on the browser, collecting private information

A

Potentially unwanted programs 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a piece of malware operates only in memory, never touching the file system. It is much harder to tact. Memory based attack

A

File-less viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Servers that are used by hackers to control malware that has been launched against targets

A

Command and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A functioning piece of software that performs some task under the control of another program 

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The name of the security industry has given to malware that uses a systems resources to mine cryptocurrency

A

Crypto-Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of malicious software that is deliberately installed, generally by an authorized user. It is a piece of code that sits dormant for a period of time until summer event or date invokes the malicious payload 

A

Logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software that spies on users, recording, and reporting on their activities 

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A piece of software, that logs, all of the key strokes how to user enters

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A tool kit designed to provide the capability of covert surveillance, and or the capability to gain unauthorized access to a target system 

A

Remote-Access Trojans (RATs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate non-standard functionality 

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Originally, and sometimes still are nothing more than methods used by software developers to ensure that they can gain access to an application, even if something were to happen in the future to prevent normal access methods

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack that uses a limited number of commonly use passwords and applies them to a large number of accounts 

A

Spraying

17
Q

Password, cracking program that uses a list of dictionary, where to try to guess the password

A

Dictionary

18
Q

Attempts all possible password combination 

A

Brute force

19
Q

Replace the tax can be employed to perform hash comparisons against the stolen password file

A

Offline

20
Q

When the brute force attack occurs in real time against the system, it is frequently being done to attack a single account with multiple examples of passwords

A

Online

21
Q

Pre-computer tables are hash values associated with passwords 

A

Rainbow tables

22
Q

Little Caesars view a USB cable is just a wire, but in fact, a USB cable can have embedded electrons in a poison cables have been found with electronics that can deliver malware to machines

A

Malicious universal serial bus (USB) cable 

23
Q

Malicious USB storage devices have been around for a long time 

A

Malicious flash drives

24
Q

Getting physical hold of somebody’s credit card you can copy the information on the magnetic strip 

A

Card cloning

25
Q

Physical devices built to intercept a credit card

A

Skimming

26
Q

Reproduces by attaching itself to other files or programs 

A

Virus