Chapter 1.2 Flashcards

(31 cards)

1
Q

Malicious software?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that gathers keystrokes?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Group of malware that coordinate attacks?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware that generates advertisements?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware that copies itself and spreads through security vulnerabilities?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware that reproduces through user action?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware that threatens the user for payment?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware that mines digital currency like bitcoin?

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware that pretends to be something else?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that is likely undesirable?

A

PUP (Potentially Unwanted Program)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware that infects the kernel of an operating system?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware that gathers information?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware used to gain total access of a system?

A

RAT (Remote Access Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does UEFI stand for?

A

Unified Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What prevents a rootkit from being installed on a modern system?

A

Secure Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What controls a botnet?

A

C&C Server (Command & Control)

17
Q

Attack that disrupts a target by overwhelming it with a flood of Internet traffic?

A

DDOS (Distributed Denial of Service)

18
Q

What type of attack waits for a predefined event before triggering?

19
Q

What is the scrambled fingerprint of a password used for authentication?

20
Q

Password cracking attack that uses few attempts with common passwords?

A

Spraying Attack

21
Q

Password cracking attack that uses every possible combination?

22
Q

Password cracking attack that uses common words from vocabulary?

A

Dictionary Attack

23
Q

Password cracking that uses pre-compiled hashes?

A

Rainbow Table

24
Q

Random characters added to a password before it is hashed?

25
What does HID stand for?
Human Interface Device
26
Attack that scans a person's credit card while they are using it for another purpose?
Skimming
27
Act of duplicating a card with a magnetic stripe?
Card Cloning
28
Technology that can learn and adapt without following explicit instructions?
Machine Learning
29
Sequence of processes involved in the production and distribution of a commodity?
Supply Chain
30
Same hash value for two different plain texts?
Hash Collision
31
Attack that seeks to cause the victim to switch to a less-secure data transmission?
Downgrade Attack