CompTIA Security+ Domain 1.2 Malware
How many characters long are MD5 hashes?
32
What is the difference between a bot and a botnet?
A bot is a program and a botnet is the network
What is AI?
A computer that can learn
What is a supply-chain attack?
A cyberattack that seeks to damage an organization by targeting less-secure elements in the supply chain
What is a keystroke?
A key used on a keyboard
What is a logic bomb?
A piece of code that lies dormant until certain conditions are met
Which of the following can trigger a logic bomb?
A program being opened, A USB being inserted into a computer, A file being deleted
What is a fileless virus?
A type of malicious software that does not rely on virus-laden files to infect a host
What is a backdoor?
An unrecognized entry into a computer or system
How can you track a rootkit on a system?
Anti-virus software, A Rootkit scanner, Anti-malware scanner
Which of the following is an example of a PUP?
Avast being installed with a free version of CCleaner, A web browser toolbar when installing Java, AVG updating and installing Google Chrome
Since a logic bomb can be used to delete files it is important to ______.
Back up all files
______ replace the system's bootloader allowing a rootkit to start before the OS.
Bootkits
A ______ attack is done by trying all possible combinations and permutations until success.
Brute Force
______ is when a credit card is cloned to be exactly like the original card.
Card cloning
How can a person keep themselves safe against card cloning? Check all that apply.
Check machine for skimmers, Keep credit card information safe, Always be cautious when entering credit card information online
What other type of data can keyloggers track?
Clipboard items
Which of the following could be the victim of an on-premises attack?
Coca-cola headquarters
What is it called when two hashes are the same?
Collision
When bots sit and wait for commands by the botmaster, this is known as _________.
Command and Control
What is the Birthday problem?
Considers the probability that in a set of N randomly chosen people, two people will have the same birthday
Which of the following can a logic bomb do?
Delete the MBR, Delete storage, Disable electrical circuits
When multiple bots work together, what type of attack can they release?
Denial of Service Attack
Who typically leaves a logic bombs in a system?
Disgruntled employee
Which ransomware seeks out Public officials and celebrities to exploit?
Doxware
Brute force attacks must be done online.
FALSE
Logic bombs cannot be identified until triggered.
FALSE
Which of the following is a type of data hackers will hold for ransom? Check all that apply.
Family photos and videos, Financial information, Trade secrets
What was the "weak link" in the 2013 Target hack?
HVAC vendor
How are passwords typically stored within a database?
Hashed
Which of the following is a true attribute of a PUP?
Installed accidentally
What is the danger of a malicious flash drive?
It installs malicious scripts/code to a system when plugged in
What type of malware is used to obtain passwords, pin codes, and credit card numbers by tracking a victim's keystrokes?
Keylogger
Why are keyloggers able to get around encryption?
Keystrokes are not encrypted
The original version of ______ had an accidental backdoor. Check all that apply.
Linux Kernel, Firefox, Microsoft Office
Which of the following ransomware is typically Android-based?
Locker
Which of the following is a type of ransomware?
Locker, Scareware, Doxware
Why is it difficult to prevent a logic bomb?
Logic bombs have a delayed response time
______ can make themselves appear as a HID device.
Malicious USB cables
Rootkits associated with attacking smartphones such as Android devices are known as ______.
Mobile Rootkits
What is typically the motivation for a malicious actor to use a ransomware attack?
Monetary
Which of the following is a strength of cloud-based security solutions?
More difficult to break in to
What does PUP stand for?
Potentially unwanted programs
Which is a type of virus?
Program virus, Boos sector virus, Scripts
The phrase botnet is a combination of which words?
Robot Network
If an attacker wants to gain access to restricted areas in a system or software, which type of malware would they use?
Rootkit
What can be added to a password to increase the strength of the password?
Salt
Which type of ransomware can lock your computer and flood it with pop-up windows?
Scareware
Which of the following is an example of AI? Check all that apply.
Siri, Alexa, Cortana
The 2020 ______ attack gave hackers access to thousands of companies and government offices that used its products.
SolarWinds
Botnets are often used to deliver ______.
Spam
Which rootkit was responsible for causing substantial damage to the nuclear program of Iran in 2010?
Stuxnet
What type of logic bomb executes on a specific day or time?
Time Bomb
The primary malware type that is used to introduce a botnet is a ______.
Trojan
Which type of malware would an attacker use if he designed a counterfeit version of an application?
Trojan
How can you prevent keyloggers?
Use anti-virus/anti-malware software, Use a keylogger scanner, Block unauthorized communication
How can you protect against ransomware? Check all that apply.
Wait to update software until you have read other user's opinions, Keep a backup of all files, Only use Windows OS over macOS
Which of the following is NOT an example of a fileless virus?
WannaCry
A computer virus attaches to ______ in order to execute malicious code.
a file, document, or program
The best way to help prevent a system from a worm attack is to use ______.
a firewall
A trojan may not be detectable by anti-virus software because ______.
a trojan can disable anti-virus software
The term 'root' refers to the ______.
administrator account on Linux/Unix
A RAT has the ability to access ______.
all files on a computer
A botnet will attack a network of ______.
any devices
A RAT is able to gain administrative control of a host by using a(n) ______.
backdoor
What type of malware is automated and designed to work without the need for human direction?
bot
The word 'kit' that makes up part of the term rootkit refers to a ______.
bundle of software applications
Once a botnet has been downloaded to a computer it will ______.
call the botmaster
One key feature of malware is that it ______.
can work jointly with other malware types
Malware could ______.
cause a system to display annoying pop-up messages, be utilized for identity theft by gathering personal information, give an attacker full control over a system
A ______ attack is a brute-force technique where attackers run through common words and phrases.
dictionary
The most common way that malware is delivered to a system is through the use of ______.
emails/attachments
The primary goal of crypto-malware is to ______.
encrypt files to obtain cryptocurrency
Which directory is the shadow file stored on a Linux system?
etc
During a ransomware attack ______.
files are encrypted and a ransom is demanded to regain access.
What is a positive result a virus can have?
fix problems in a system
An attacker may use a(n) ______ to hide malware such as trojans.
free game, new tool/simple application, music video file
A defining trait of a rootkit is to ______.
gain undetected access in a system
A password should never be stored ______. (Select two)
in plaintext, unencrypted
AI mimics human ______.
intelligence
One tool that hackers use to get sensitive information from victims is/are ______.
keyloggers
Adversarial AI uses AI for ______ intent.
malicious
Malware is a combination of which two words?
malicious and software
Keyloggers will primarily enter a system as ______.
malware
Software that is designed to intentionally cause harm to a device, server, or network is ______.
malware
Which file preceded the shadow file on a Linux system?
passwd
What type of virus comes bundled with an application?
program virus
A ______ attack is a brute-force technique where attackers use a pre-calculated series of hashes.
rainbow table
Viruses and worms are similar forms of malware because both can ______.
replicate
A(n) ______ is a card reader that can be disguised to look like part of an ATM.
skimmer
Viruses and worms can affect a system by ______.
slowing down the system
The type of keylogger that does not require a connection between a keyboard and a computer is a ______.
software keylogger
A ______ attack is a brute-force technique where attackers use a few commonly used passwords.
spraying
Rootkits are hard to discover and remove because ______.
they modify the core of an operating system
Some examples of malware include:
trojans, worms, and bots
One key way to protect against a RAT is to ______.
update anti-malware software
The best way to counteract a computer virus is to ______.
use anti-virus software
One vulnerability that makes computers susceptible to malware is ______.
using old versions of software
Which malware type can self-replicate with the assistance of a host system?
virus
Which malware type can replicate itself without the help of a host system or human interaction?
worm