Cyber Defense 7.3.18

¡Supera tus tareas y exámenes ahora con Quizwiz!

Mobile device attacks can be devastating to the device and the data stored on it. Which of the following common attacks allows the attacker to steal data or money from the victim?

Agent Smith

File system and registry changes can indicate or suggest a security breach, or attack has occurred. An attacker may change critical system configuration stored in system files or registry keys to change or disable essential security settings or store malware and scripts. Which of the following are signs that might indicate a security breach or attack on a file system? (Select two.)

The creation of new files or folders in unexpected locations or with unusual names. The removal of temp files or deleting log entries.

Which method of malware analysis includes matching signatures, analyzing code without executing it, disassembly, and string searching?

Static analysis

File fingerprinting, scanning, string searches, and disassembly are all used to identify malware. When these techniques are used, what is the identifying information called?

Malware signature

As a sales representative for your company, you are in an airline lounge waiting for your next flight. To make the best use of your time, you decide to connect to the internet from your tablet to do some additional research about the company you will be contacting. You search for and connect to a Wi-Fi access point with the same name as the access point provided by the airline. However, it does not require a passcode, which the airline has instructed you to use to make the connection. You suspect that it might be a rogue access point. Which of the following vulnerability vectors does this type of attack fall under?

Network

What is the MOST important consideration for sandboxing activities when performing malware analysis?

Physical or logical isolation of the sandbox host from the main network

Mary has been receiving text messages that contain links to malicious websites. Which type of attack is Mary a victim of?

SMishing

Which of the following mobile security concerns is characterized by malicious code that specifically targets mobile devices?

Malicious websites

Which of the following are the general types of persistence IoCs? (Select two.)

Change or anomaly in the registry An unauthorized scheduled task

Which of the following malware analysis techniques identifies unique malware programs by generating a hash for that program?

Fingerprinting


Conjuntos de estudio relacionados

Unit 4 and 5 Practice - 1st Semester Units

View Set

Chapter 11, 13, 14, 15 Mastering A & P lab

View Set

chapter 14: hunger and food insecurity

View Set

Computer User Support - TestOut Chapter 15 "Security" Labs (CNET-102)

View Set

Reading 44: Market Organization and Structure

View Set

NCLEX 10000 Integumentary Disorders

View Set

Databases Exam #3 - Multiple Choice

View Set