Cyber Defense 7.3.18
Mobile device attacks can be devastating to the device and the data stored on it. Which of the following common attacks allows the attacker to steal data or money from the victim?
Agent Smith
File system and registry changes can indicate or suggest a security breach, or attack has occurred. An attacker may change critical system configuration stored in system files or registry keys to change or disable essential security settings or store malware and scripts. Which of the following are signs that might indicate a security breach or attack on a file system? (Select two.)
The creation of new files or folders in unexpected locations or with unusual names. The removal of temp files or deleting log entries.
Which method of malware analysis includes matching signatures, analyzing code without executing it, disassembly, and string searching?
Static analysis
File fingerprinting, scanning, string searches, and disassembly are all used to identify malware. When these techniques are used, what is the identifying information called?
Malware signature
As a sales representative for your company, you are in an airline lounge waiting for your next flight. To make the best use of your time, you decide to connect to the internet from your tablet to do some additional research about the company you will be contacting. You search for and connect to a Wi-Fi access point with the same name as the access point provided by the airline. However, it does not require a passcode, which the airline has instructed you to use to make the connection. You suspect that it might be a rogue access point. Which of the following vulnerability vectors does this type of attack fall under?
Network
What is the MOST important consideration for sandboxing activities when performing malware analysis?
Physical or logical isolation of the sandbox host from the main network
Mary has been receiving text messages that contain links to malicious websites. Which type of attack is Mary a victim of?
SMishing
Which of the following mobile security concerns is characterized by malicious code that specifically targets mobile devices?
Malicious websites
Which of the following are the general types of persistence IoCs? (Select two.)
Change or anomaly in the registry An unauthorized scheduled task
Which of the following malware analysis techniques identifies unique malware programs by generating a hash for that program?
Fingerprinting