Understanding Threat Actors Flashcards

1
Q

capability, sophistication, targeted, well resourced, funded and often causing a long period of unauthorized access are hallmarks of what type of attack?

A

Advanced Persistent Threat (ATP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the technical symptom from a DDoS attack?

A

resource exhaustion (of the CPU/memory etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the key difference between a virus and a worm

A

A virus requires the user to execute a program (or the system to do it); worms don’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of malware does the drive-by method relate to? What are the 4 basic steps of a drive-by?

A

drive-by method is associated with trojan horses and some spyware

  1. attacks compromise a website
  2. they install a trojan embedded in the site code
  3. they trick users to the site
  4. user visits site and the trojan automatically downloads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

rogue-ware is an example of what type of malware?

A

Trojan. It masquerades as software it isn’t, e.g. fake free anti-virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what type of attack allows the attacker to access the victims computer at any time and take control?

A

RAT (Remote Access Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key differences between normal spyware and privacy-invasive software?

A

normal spyware involves monitoring the user’s activity and sending some information to a third party

privacy-invasive software tries to separate users from their money using data-harvesting techniques to then impersonate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is system-level access and what type of attack does it pertain to?

A

a program that has system-level access has the same permission level for access as the operating system itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

rootkits use what processes to enable it to control system behavior? How do they work?

A

hooked processes

they intercept calls to the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

rootkits are hard to find, but some tools can detect them, where do they look?

A

in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tailgating is a form of what?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do most email clients block images?

A

To stop beacon links from working that attempt to download an image from a server which results in the server logging your email address as valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the difference between spear-fishing and whaling?

A

spear fishing targets specfic groups of users or a single user

whaling targets a high-level employee like an MD or CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of common attack can digital signatures protect against?

A

spear-fishing/whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you receive a call with a pre-recorded automated message on, what attack might be taking place?

A

Vishing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly