Cheat Sheet Flashcards

(80 cards)

1
Q

What is the main difference between a Virus and a Worm?

A

Virus: Requires a host file (e.g., an .exe or a document) and human interaction (e.g., opening the file) to spread.

Worm: Is self-replicating and spreads automatically across a network, often by exploiting vulnerabilities. It does not need a host file or human help.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the term for a virus that mutates its code with each new infection? This is done specifically to ensure that its hash value (or signature) is different every time, allowing it to evade simple signature-based detection.

A

Polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: A user calls the help desk, reporting that a large pop-up window has taken over their screen. The window, which looks like a system utility, is flashing red and warning that “128 viruses and 47 exploits” have been found. It is demanding a one-time $49.95 payment to “purchase the full security suite” and clean the computer.

What type of malware BEST describes this attack?

A. Adware
B. Scareware
C. Ransomware
D. Spyware

A

B. Scareware

Explanation: This is a classic example of scareware. It uses deception and social engineering (frightening pop-ups, fake scan results) to trick a user into paying for a fake or malicious “service.” It preys on the user’s fear.

It is not ransomware because the user’s files are not encrypted; they are just being tricked, not extorted.

It is not adware, which typically just displays unwanted (but not necessarily fake) advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is UPnP, what ports does it use, and what is its security risk?

A

Universal Plug and Play
Ports UDP/1900 for discovery, TCP/5000 for accepting incoming connections from other UPnP devices.

UPnP is a protocol that allows devices on a network to automatically discover each other and configure network settings (like opening ports).

Risk: It’s a major security flaw. Malware (especially worms) can exploit it to bypass the firewall and open ports for remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user downloads what they believe is a free “video codec” to watch a movie. After running the installer, their computer seems to work normally, but in the background, the program has installed a hidden tool that gives an attacker complete remote control of their system.

What type of malware BEST describes this?

A

RAT (Remote Access Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the term for a type of malware designed to gain the highest level of privilege (root/administrator) and use its deep system access to hide itself and its malicious activity from the operating system and security software?

This malware can infect the OS kernel, the bootloader (a bootkit), or even the hardware firmware.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user reports their mouse and keyboard are acting “flaky.” A technician investigates and finds an unknown USB dongle plugged in between the keyboard cable and the desktop’s USB port.

What is this malicious device MOST LIKELY?

A

Hardware Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A

uses popups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bots

A

infected machine used as an attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user calls the help desk in a panic because their “mouse is moving on its own” and closing windows. The technician disconnects the network cable immediately. Later analysis shows a malware infection that established a reverse connection to an external IP, allowing the attacker to interactively control the desktop.

What specific type of malware is this?

A

RAT (Remote Access Trojan)

Explanation:
* Spyware/Keyloggers are passive; they hide and steal data silently.
* RATs are active; they provide a Command and Control (C2) channel that gives the attacker interactive remote control over the system. The “ghost in the machine” symptom (mouse moving) is the classic giveaway of a RAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic bomb

A

needs a trigger, such as time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

uses email; targets one person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear phishing

A

attacks a group; look for plurals in the question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whaling

A

attacks CEO or high‐level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vishing

A

uses a telephone or leaves a voicemail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tailgating

A

follows someone through; does not use credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Impersonating

A

pretends to be from the help desk or IT team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dumpster diving

A

pulls information from the trash bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Shoulder surfing

A

someone looks over an employee’s shoulder or uses a smartphone to video your bank transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Watering hole

A

infects a trusted website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authority

A

email from CEO or HR; asks you to fill in a form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Urgency

A

letting a fireman into the server room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DoS

A

one host taking out another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DDoS

A

multiple hosts taking out one host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Man‐in‐the middle
interception attack data in real time
26
Replay
interception attack data replayed at a later date
27
Kerberos
prevents replay and pass‐the‐hash attacks
28
Buffer overflow
too much data in a field
29
Integer overflow
too large a number in a data field
30
XSS
uses HTML tags/JavaScript; no authentication
31
XSRF/CSRF
asks you to click on an icon and provide authentication
32
Privilege escalation
tries to get admin rights
33
ARP poisoning
prevented by using static entries in the arp cache—for example, arp ‐s
34
DNS poisoning
prevented by using DNSSEC that produces RRSIG records
35
ARP
local LAN attack
36
Man‐in‐the‐browser
trojan already installed; after bank transactions; URL does not change
37
Zero‐day virus
cannot be detected other than baseline; takes more time to get antidote.
38
Pass‐the‐hash
attacks NTLM authentication; prevented by disabling NTLM or using Kerberos
39
Session hijacking
steals your cookies
40
Evil twin
looks like a legitimate WAP
41
Rogue AP
free; steals information; prevented by using 802.1x
42
Jamming
interference attack
43
WPS
push the button; brute-force attacks underlying password
44
Bluejacking
hijacks Bluetooth phone; sends text messages
45
Bluesnarfing
steals contacts from Bluetooth phone
46
RFID
prevents theft of small devices
47
NFC
wireless payment; short range
48
Birthday
hash-collision attack; digital signatures vulnerable
49
Disassociation attacks
prevents access to the WAP
50
Rainbow tables
precomputed list of passwords and hashes; used for hash-collision attacks
51
Dictionary
password; prevented by using a random character in your password or misspelling your password
52
Brute force
every available combination; prevents account lockout low value or salt password
53
Collison
matches hashes
54
Downgrade
uses legacy SSL rather than TLS; POODLE is a classic example
55
Script kiddie
purchases scripts and programs, probably from the dark web
56
Hacktivist
politically motivated agent
57
Nation state/APT
foreign government agent
58
Organized crime
profit-driven agent who will blackmail you
59
Insider
known as a malicious insider; hardest to detect
60
Intrusive
can cause damage
61
Black box
knows nothing
62
White box
knows everything
63
Gray box
has at least one piece of information—for example, a password or diagram
64
Fuzzing
enters random characters into an application for spurious results; black-/white-box pen testers use it
65
Pivot
accesses a network through a vulnerable host, then attacks a secondary, more important host
66
Initial exploitation
where pen testing starts
67
Escalation of privileges
obtains admin rights
68
Intrusive scan
used in pen testing; can cause damage to your system
69
Passive
no damage
70
Credentialed
admin rights; more information; audit files; account and certificate information
71
Non‐credentialed
low level; finds missing patches
72
Race condition
two threads accessing data at the same time
73
End‐of‐life systems
lack of vendor support; no patches
74
Error handling
customer side makes error small; IT support error needs all information
75
Default configuration
changes username or passwords
76
Resource exhaustion
running CPU at 100% or running out of memory
77
Key management
ensures keys signed in and out each day
78
Untrained users
not complying with policies
79
Competitors
steals your trade secrets; beats you to market with your product
80
Weak implementation
uses WEP; better to use WPA2‐CCMP as it is the strongest