Unit 5 - Module 4 - Theats Flashcards

1
Q

What do you call a manipulation technque that exploits human error to gain private information, access , or valuables?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These are the stages or what?

1) Prepare
2) Establish Trust
3) Use persuasion tactics
4) Disconnect from the target ( Dissapear after wards )

Stages of __________

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What social engineering tactic temps people into compromising their security?

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What digital communications trick people into revealing sensitive data or deploying malicious software?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a type of bait used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money?

A

Quid pro quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What social engineering tact is used which unauthorized people follow an authorized person into a restricted area?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack is when a threat actor compromises a website frequently visited by a specific group of users?

A

Watering Hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call the use of digital communications to trick people into revealing sensitive data or deploying malicous software?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do you call the exploitation of electronic voice communication to obtain sensitive information or impersonate a known source?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you call a subnet of email phising in which specific people are purposefully targeted, such as the accountants of a small business?

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call the spear phishing attempts that are aimed at high-ranking executives in an organization?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you call the technique where attackers impersonate customer service reps on social media?

A

Angler Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What malware is used to gather and sell information without consent?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call malicious code written to interfere with computer operations and cause damage to data and software?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What malware can duplicated and spread itself across systems on its own?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What malware looks like a legitmate file or program?

A

Trojan

17
Q

What type of malicious attack is when the attackers encrypt an organization’s data and demand payment to restore access?

A

Ransomware

18
Q

What do you call software designed to harm device or networks?

A

Malware

19
Q

What do you call advertising-supported software?

A

Adware

20
Q

What do you call malicious adware that falls into a sub-category of malware?

A

Potentially unwanted application (PUA)

21
Q

What do you call malware that does not need to be installed by the user becuase it uses legitimate programs that are already installed on the computer?

A

Fileless Malware

22
Q

What do you call malware that provides remote, administrative access to a computer?

A

Rootkit

23
Q

What do you call a type of malware that comes packed with malicious code which is delivered and installed onto a target system?

A

Dropper

24
Q

What do you call the “robot network” which is a collection of infected computers from malware that are under the control of a single threat actor, known as the “bot-herder”?

A

Botnet

25
Q

What is the form of malware that installs software to illegally mine cryptocurrencies?

A

Cryptojacking

26
Q

What is malicious code or behavior that’s used to take advantage of coding flaws in a web application?

A

Web-based exploits

27
Q

What is malicious code inserted into a vulnerable application?

A

Injection Attack

28
Q

What do you call an injection attack that inserts code into a vulnerable website or web application?

A

Cross-site scripting (XSS)

29
Q

What kind of attack are these?

1) Reflected
2) Stored
3) DOM-based

A

Cross-site scripting attacks

30
Q

What do you call an instance when malicious script is sent to a server and activated during the server’s responce?

A

Reflected XSS attack

31
Q

What do you call an instance when malicious script is injected directly on the server?

A

Stored XSS Attack

32
Q

What is an instance when malicious script exists in the webpage a browser loads?

A

DOM-based XSS attack

33
Q

What is a coding techinique that executes SQL statementes before passing them onto the database?

A

Prepared Statement

34
Q

What programming removes user input which could interpreted as code?

A

Input Sanitization

35
Q

What programming ensures user input meets a system’s expections?

A

Input Validation

36
Q

What model is this? ( What guide )

1) Define the scope
2) Identify Threats
3) Characterize the enviroment
4) Analyze threats

A

Threat Model Steps

37
Q

What is a popular threat modeling framework that’s used across many industries?

A

PASTA

Process for Attack Simulation and Threat Analysis

38
Q
A