Types of Attack Flashcards

1
Q

Ransomware

A

Malicious software that encrypts files and demands payment for their release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojans

A

Programs that appear legitimate but contain malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious software that encrypts files and demands payment for their release.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Programs that appear legitimate but contain malicious code.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worms

A

Self-replicating malware that spreads across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Self-replicating malware that spreads across networks.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Potentially Unwanted Programs (PUPs)

A

Software that may have unwanted effects, often bundled with legitimate applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term refers to software applications that exhibit undesirable behavior?

A

Potentially Unwanted Programs (PUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe a fileless virus.

A

A fileless virus is a type of malware that operates in memory without leaving traces on disk, making detection challenging for traditional antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of malware operates in memory without leaving traces on disk?

A

Fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Command and Control (C&C) ?

A

Command and control refers to the communication channel used by attackers to control compromised devices and exfiltrate data from targeted systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term describes the communication channel used by attackers to control compromised devices?

A

Command and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define bots in cybersecurity.

A

Bots are automated software agents that perform tasks, often maliciously, without human intervention, such as spreading malware or launching DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are automated software agents that perform tasks, often maliciously?

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain cryptomalware.

A

Cryptomalware is a type of malware that encrypts files or systems and demands ransom for decryption, often using strong encryption algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of malware encrypts files and demands ransom for decryption?

A

Cryptomalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are logic bombs?

A

Logic bombs are code snippets inserted into systems to execute a malicious action at a specific time or after a triggering event, often causing system disruptions or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of code is inserted into systems to execute a malicious action at a specific time or event?

A

Logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define spyware.

A

Spyware is a type of malware that secretly gathers information about a user’s activities without their consent, often for advertising or espionage purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of malware secretly gathers information about a user’s activities?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe keyloggers.

A

Keyloggers are software or hardware devices designed to record keystrokes, capturing sensitive information such as passwords or credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What software or hardware devices record keystrokes?

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Remote Access Trojan (RAT)?

A

A Remote Access Trojan is a type of malware that provides unauthorized access to a victim’s system, allowing remote control by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What type of malware provides unauthorized access to a victim’s system for remote control?

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define rootkit.

A

A rootkit is a type of malware that is designed to conceal its presence or the presence of other malware on a system, often granting privileged access to attackers.

26
Q

What type of malware is designed to conceal its presence on a system?

A

Rootkit

27
Q

What is a backdoor?

A

A backdoor is a hidden entry point into a system or software application that allows unauthorized access to attackers.

28
Q

What term describes a hidden entry point into a system or software application?

A

Backdoor

29
Q

What is password spraying?

A

Password spraying is a technique used by attackers to attempt a few common passwords against many accounts, reducing the risk of detection by avoiding multiple failed login attempts.

30
Q

What technique involves trying a few common passwords against many accounts?

A

Password spraying

31
Q

Describe a dictionary attack.

A

A dictionary attack is a type of password attack where an attacker uses a precompiled list of common passwords or dictionary words to attempt unauthorized access to user accounts.

32
Q

What type of password attack uses a precompiled list of common passwords or words?

A

Dictionary attack

33
Q

What is a brute force attack?

A

A brute force attack is a password attack method where attackers systematically try all possible combinations of characters until the correct password is found.

34
Q

What password attack method involves trying all possible combinations of characters?

A

Brute force attack

35
Q

Explain a rainbow table attack.

A

A rainbow table attack is a type of password attack where attackers use precomputed tables of hash values to quickly crack hashed passwords.

36
Q

What type of password attack uses precomputed tables of hash values?

A

Rainbow table attack

37
Q

Describe plaintext/unencrypted password attacks.

A

Plaintext/unencrypted password attacks involve intercepting passwords sent over a network or stored in a system without encryption, allowing attackers to obtain them easily.

38
Q

What type of password attack involves intercepting passwords without encryption?

A

Plaintext/unencrypted password attack

39
Q

What is a physical attack involving USB cables?

A

A physical attack using a malicious USB cable involves using specially modified USB cables to compromise devices when connected.

40
Q

What type of physical attack involves using specially modified USB cables?

A

Malicious Universal Serial Bus (USB) cable attack

41
Q

Define a physical attack using a flash drive.

A

A physical attack using a malicious flash drive involves infecting a USB flash drive with malware and leaving it in a public place for unsuspecting victims to plug into their devices.

42
Q

What type of physical attack involves infecting USB flash drives with malware?

A

Malicious flash drive attack

43
Q

What is card cloning?

A

Card cloning is a physical attack where attackers create duplicate copies of credit or debit cards, typically by skimming information from legitimate cards.

44
Q

What physical attack involves creating duplicate copies of credit or debit cards?

A

Card cloning

45
Q

Describe skimming in terms of physical attacks.

A

Skimming is a physical attack where attackers use devices to capture data from the magnetic stripe of credit or debit cards during legitimate transactions.

46
Q

What physical attack involves capturing data from the magnetic stripe of cards?

A

Skimming

47
Q

What is tainted training data in adversarial AI?

A

Tainted training data refers to maliciously modified or manipulated data used to train machine learning models, leading to biased or compromised results.

48
Q

What term describes maliciously modified data used to train machine learning models?

A

Tainted training data

49
Q

Describe the security aspect of machine learning algorithms.

A

The security of machine learning algorithms refers to protecting models from adversarial attacks, ensuring they are robust and resistant to manipulation or exploitation.

50
Q

What aspect of machine learning involves protecting models from adversarial attacks?

A

Security of machine learning algorithms

51
Q

What are supply-chain attacks?

A

Supply-chain attacks are cyberattacks that target vulnerabilities in the software supply chain, aiming to compromise products or services before they reach end-users.

52
Q

What type of cyberattacks target vulnerabilities in the software supply chain?

A

Supply-chain attacks

53
Q

Compare cloud-based and on-premises attacks.

A

Cloud-based attacks target resources and data hosted in cloud environments, while on-premises attacks target resources and data stored within an organization’s physical infrastructure.

54
Q

What type of attacks target resources and data hosted in cloud environments?

A

Cloud-based attacks

55
Q

What is a Birthday cryptographic attack?

A

The Birthday cryptographic attack exploits the birthday paradox to find collisions in hash functions more efficiently than brute force methods.

56
Q

What type of cryptographic attack exploits the birthday paradox?

A

Birthday cryptographic attack

57
Q

Describe a collision cryptographic attack.

A

A collision cryptographic attack aims to find two different inputs that produce the same hash value, compromising the integrity of hash functions.

58
Q

What type of cryptographic attack aims to find two inputs producing the same hash value?

A

Collision cryptographic attack

59
Q

Explain a cryptographic downgrade attack.

A

A cryptographic downgrade attack exploits weaknesses in cryptographic protocols to force communication partners to use older, less secure encryption algorithms.

60
Q

What type of attack exploits weaknesses in cryptographic protocols to force the use of less secure encryption algorithms?

A

Cryptographic downgrade attack