Security+ Flashcards

(24 cards)

1
Q

What is the newest trend in ransomware?

A

Ransomware as a service

This model allows attackers to rent ransomware tools and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Trojans in the context of malware?

A
  • Do not have replicating abilities like viruses or worms
  • Can be part of a more elaborate distributed denial of service or botnet attack
  • Remote access Trojans (RAT) allow remote control of infected computers

Trojans disguise themselves as legitimate software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary characteristic of viruses?

A

They replicate and spread to other systems

Viruses attach themselves to clean files and spread throughout a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define worms in the context of malware.

A

A special form of self-replicating virus networks

Worms can spread independently without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware?

A

Malware designed to gather information from a user’s device without their knowledge

Spyware can track user activity and collect sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is bloatware?

A

Unnecessary software that consumes system resources

Often pre-installed on devices and can slow down performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are key loggers?

A

Malware that records keystrokes to capture sensitive information

Key logger detectors are special mitigation tools to combat this threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are root kits?

A

Type of malware that gives threat actors control of systems without user consent or knowledge

Root kits can hide their presence and maintain persistent access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define logic bombs.

A

Malware triggered by specific events

Logic bombs can execute malicious actions when certain conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of physical attacks?

A
  • Penetration of safes
  • Penetration of doors

Physical attacks target tangible assets and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is RFID cloning?

A

The unauthorized copying of RFID tags

This can lead to unauthorized access to secure areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does skimming refer to?

A

The theft of card information using a device that reads magnetic stripes

Skimming often occurs at ATMs or point-of-sale terminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are environmental attacks?

A

Attacks on any environmental system that is not air-gapped

These attacks can compromise systems connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does DOS stand for?

A

Denial of Service

DOS attacks aim to make a service unavailable to its intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DDOS attack?

A

Distributed Denial of Service

DDOS attacks use multiple systems to flood a target with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are botnets?

A

Networks of compromised computers controlled by a single attacker

Botnets can be used for various malicious activities, including DDOS attacks.

17
Q

What is cache poisoning?

A

A type of DNS attack that can cause redirects

Cache poisoning manipulates DNS records to redirect users to malicious sites.

18
Q

What is DNS hijacking?

A

An attack that redirects users from legitimate websites to fraudulent ones

DNS hijacking can lead to phishing and data theft.

19
Q

What does DNS spoofing involve?

A

Falsifying DNS responses to redirect traffic

DNS spoofing can be used to lead users to malicious sites.

20
Q

What is an NXDOMAIN attack?

A

An attack that exploits DNS queries for non-existent domains

NXDOMAIN attacks can be used to disrupt services or gather information.

21
Q

What is DNS flooding?

A

A type of attack that overwhelms DNS servers with requests

DNS flooding can lead to service outages.

22
Q

What is an amplification attack?

A

An attack that exploits a small request to generate a larger response

Amplification attacks can significantly increase the volume of traffic directed at a target.

23
Q

What is DNS tunneling?

A

Exploiting the DNS protocol to install malware

DNS tunneling can be used to bypass security measures.

24
Q

What are wireless attacks?

A

Attacks targeting wireless networks and devices

Wireless attacks can exploit vulnerabilities in Wi-Fi security.