Types of Attacks/Malware Flashcards

1
Q

_____ is software installed alongside a package or from a computer store that the user did not request.

A

Potentially unwanted programs (PUP) or

potentially unwanted applications (PUA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ are malware concealed within an installer package for software that appears to be legitimate

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is a fake antivirus, where a web pop-up claims to have detected viruses on the computer and prompts the user to initiate a full scan, which installs the attacker’s Trojan.

A

rogueware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ are memory-resident viruses that replicate over network resources

A

Worms

The primary effect of a worm infestation is to rapidly consume network bandwidth as the worm replicates. A worm may also be able to perform a Denial of Service attack by crashing operating systems and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____, sequences of code insert themselves into another executable program. When executing the application, the virus code becomes active.

A

program virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _____ uses both boot sector and executable file infection methods of propagation.

A

multipartite virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _____ uses the programming features available in Microsoft Office files.

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ is a type of brute force attack aimed at exploiting collisions in hash functions. A collision is where a function produces the same hash value for two different plaintexts.

A

Birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _____ is a password attack that allows an attacker to use a set of plaintext passwords and their hashes to crack passwords.

A

Rainbow table attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _____ is a malicious program or script set to run under particular circumstances or in response to a defined event

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ is a scripted trap that runs in the event an account gets deleted or disabled

A

Mine

Anti-virus software is unlikely to detect this kind of malicious script or program, so the security specialist would not be able to discover the script during an investigation. The security specialist would uncover the mine once it gets executed and causes damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____ functions as a backdoor and allows the attacker to access the PC, upload files, and install software on it.

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A fileless malicious software can replicate between processes in memory on a local host or over network shares. What other behaviors and techniques would classify a malware as fileless rather than a normal virus? (Select all that apply.)

  1. Uses “Live off the land” techniques
  2. Runs lightweight shellcode
  3. Uses low observable characteristic attacks
  4. Writes code to disk
A

1, 2, and 3

Fileless malware uses “live off the land” techniques rather than compiled executables to evade detection. This means that the malware code uses legitimate scripting tools like Windows PowerShell.

Fileless malware uses lightweight shellcode to achieve a backdoor mechanism on the host. The shellcode is easy to recompile in an obfuscated form to evade detection by scanners.

Fileless malware can be classified as using low observable characteristics (LOC) attacks which can make it less intrusive than other malware

Fileless malicious software (malware) does not write code to disk. The malware uses memory resident techniques to run in its own process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a horizontal brute-force online attack. This means that the attacker chooses one or more common passwords and tries to use them in conjunction with multiple usernames.

A

Password Spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An _____ attack is where the hacker interacts directly with the authentication service and submits multiple passwords (and variations) to gain access with a single account (e.g., root).

A

Online Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _____ occurs when there is a good chance of guessing the likely value of the plaintext or non-complex password with a common word in a dictionary.

A

Dictionary attack

17
Q

A _____ is a type of brute force attack aimed at exploiting collisions in hash functions. A collision is where a function produces the same hash value for two different plaintexts.

A

Birthday attack

18
Q

A _____ can facilitate a Man-in-the-Middle (MitM) attack by requesting that the server use a lower specification protocol with weaker ciphers and key lengths.

A

Downgrade attack

19
Q

In a _____, the adversary spoofs the victim’s IP address and pings the broadcast address of a third-party network. Each host directs its echo responses to the victim server.

A

Smurf Attack

20
Q

A _____ is a backdoor malware that changes core system files and programming interfaces so that local shell processes no longer reveal their presence.

A

Rootkit