What is the purpose of Digital Rights Management (DRM)?
To enforce controls on digital media use (e.g., prevent unauthorized copying/playing).
What do we call software that is free to use and modify?
Open-source software.
What malware creates a network of ‘zombie’ devices controlled by an attacker?
Botnet (bot malware that enrolls hosts into a command-and-control network).
What is a backdoor in security terms?
A hidden mechanism that bypasses normal authentication/controls.
What is a brute-force attack?
Systematically trying all possible keys/passwords until one works.
What does BEC stand for and what is it?
Business Email Compromise; targeted, convincing emails to redirect payments or data.
How does a DoS attack differ from a DDoS?
DoS: single source; DDoS: many sources simultaneously.
What is an evil twin attack?
A rogue wireless AP using the same SSID as a legitimate one to lure clients.
What malware secretly captures keystrokes?
Keylogger.
What is a logic bomb?
Malicious code that triggers under specific conditions (e.g., date, user action).
What is a man-in-the-middle (MITM) attack?
An attacker intercepts/relays communications, potentially altering data.
What is phishing?
Deceptive messages posing as trusted entities to steal credentials/data.
What is spear phishing?
Highly targeted phishing aimed at a specific person or org.
What is whaling?
Spear phishing targeting executives/high-profile individuals.
What is a rootkit?
Stealthy malware that hides its presence and often gains admin/kernel-level control.
What is the goal of a replay attack?
To capture and re-send valid transmissions to gain unauthorized access.
What is tailgating (piggybacking)?
Following an authorized person into a restricted area without permission.
What is a worm?
Self-contained malware that self-replicates and spreads without user action.
How does a Trojan differ from a virus/worm?
Trojan masquerades as legitimate; it does not self-replicate like worms/viruses.
What is a watering hole attack?
Compromising a site frequented by a target group to infect visitors.
What is a zero-day attack?
Exploiting a previously unknown (unpatched) vulnerability.
Where do you add a user to a department group in AD?
Active Directory Users and Computers > User properties > Member Of tab.
What does the ‘password history’ policy control?
How many unique new passwords must be used before reuse is allowed.
What is the principle of least privilege?
Grant only the minimum access rights needed to perform a job.