CompTIA Security+ Domain 1.2 Malware

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many characters long are MD5 hashes?

32

What is the difference between a bot and a botnet?

A bot is a program and a botnet is the network

What is AI?

A computer that can learn

What is a supply-chain attack?

A cyberattack that seeks to damage an organization by targeting less-secure elements in the supply chain

What is a keystroke?

A key used on a keyboard

What is a logic bomb?

A piece of code that lies dormant until certain conditions are met

Which of the following can trigger a logic bomb?

A program being opened, A USB being inserted into a computer, A file being deleted

What is a fileless virus?

A type of malicious software that does not rely on virus-laden files to infect a host

What is a backdoor?

An unrecognized entry into a computer or system

How can you track a rootkit on a system?

Anti-virus software, A Rootkit scanner, Anti-malware scanner

Which of the following is an example of a PUP?

Avast being installed with a free version of CCleaner, A web browser toolbar when installing Java, AVG updating and installing Google Chrome

Since a logic bomb can be used to delete files it is important to ______.

Back up all files

______ replace the system's bootloader allowing a rootkit to start before the OS.

Bootkits

A ______ attack is done by trying all possible combinations and permutations until success.

Brute Force

______ is when a credit card is cloned to be exactly like the original card.

Card cloning

How can a person keep themselves safe against card cloning? Check all that apply.

Check machine for skimmers, Keep credit card information safe, Always be cautious when entering credit card information online

What other type of data can keyloggers track?

Clipboard items

Which of the following could be the victim of an on-premises attack?

Coca-cola headquarters

What is it called when two hashes are the same?

Collision

When bots sit and wait for commands by the botmaster, this is known as _________.

Command and Control

What is the Birthday problem?

Considers the probability that in a set of N randomly chosen people, two people will have the same birthday

Which of the following can a logic bomb do?

Delete the MBR, Delete storage, Disable electrical circuits

When multiple bots work together, what type of attack can they release?

Denial of Service Attack

Who typically leaves a logic bombs in a system?

Disgruntled employee

Which ransomware seeks out Public officials and celebrities to exploit?

Doxware

Brute force attacks must be done online.

FALSE

Logic bombs cannot be identified until triggered.

FALSE

Which of the following is a type of data hackers will hold for ransom? Check all that apply.

Family photos and videos, Financial information, Trade secrets

What was the "weak link" in the 2013 Target hack?

HVAC vendor

How are passwords typically stored within a database?

Hashed

Which of the following is a true attribute of a PUP?

Installed accidentally

What is the danger of a malicious flash drive?

It installs malicious scripts/code to a system when plugged in

What type of malware is used to obtain passwords, pin codes, and credit card numbers by tracking a victim's keystrokes?

Keylogger

Why are keyloggers able to get around encryption?

Keystrokes are not encrypted

The original version of ______ had an accidental backdoor. Check all that apply.

Linux Kernel, Firefox, Microsoft Office

Which of the following ransomware is typically Android-based?

Locker

Which of the following is a type of ransomware?

Locker, Scareware, Doxware

Why is it difficult to prevent a logic bomb?

Logic bombs have a delayed response time

______ can make themselves appear as a HID device.

Malicious USB cables

Rootkits associated with attacking smartphones such as Android devices are known as ______.

Mobile Rootkits

What is typically the motivation for a malicious actor to use a ransomware attack?

Monetary

Which of the following is a strength of cloud-based security solutions?

More difficult to break in to

What does PUP stand for?

Potentially unwanted programs

Which is a type of virus?

Program virus, Boos sector virus, Scripts

The phrase botnet is a combination of which words?

Robot Network

If an attacker wants to gain access to restricted areas in a system or software, which type of malware would they use?

Rootkit

What can be added to a password to increase the strength of the password?

Salt

Which type of ransomware can lock your computer and flood it with pop-up windows?

Scareware

Which of the following is an example of AI? Check all that apply.

Siri, Alexa, Cortana

The 2020 ______ attack gave hackers access to thousands of companies and government offices that used its products.

SolarWinds

Botnets are often used to deliver ______.

Spam

Which rootkit was responsible for causing substantial damage to the nuclear program of Iran in 2010?

Stuxnet

What type of logic bomb executes on a specific day or time?

Time Bomb

The primary malware type that is used to introduce a botnet is a ______.

Trojan

Which type of malware would an attacker use if he designed a counterfeit version of an application?

Trojan

How can you prevent keyloggers?

Use anti-virus/anti-malware software, Use a keylogger scanner, Block unauthorized communication

How can you protect against ransomware? Check all that apply.

Wait to update software until you have read other user's opinions, Keep a backup of all files, Only use Windows OS over macOS

Which of the following is NOT an example of a fileless virus?

WannaCry

A computer virus attaches to ______ in order to execute malicious code.

a file, document, or program

The best way to help prevent a system from a worm attack is to use ______.

a firewall

A trojan may not be detectable by anti-virus software because ______.

a trojan can disable anti-virus software

The term 'root' refers to the ______.

administrator account on Linux/Unix

A RAT has the ability to access ______.

all files on a computer

A botnet will attack a network of ______.

any devices

A RAT is able to gain administrative control of a host by using a(n) ______.

backdoor

What type of malware is automated and designed to work without the need for human direction?

bot

The word 'kit' that makes up part of the term rootkit refers to a ______.

bundle of software applications

Once a botnet has been downloaded to a computer it will ______.

call the botmaster

One key feature of malware is that it ______.

can work jointly with other malware types

Malware could ______.

cause a system to display annoying pop-up messages, be utilized for identity theft by gathering personal information, give an attacker full control over a system

A ______ attack is a brute-force technique where attackers run through common words and phrases.

dictionary

The most common way that malware is delivered to a system is through the use of ______.

emails/attachments

The primary goal of crypto-malware is to ______.

encrypt files to obtain cryptocurrency

Which directory is the shadow file stored on a Linux system?

etc

During a ransomware attack ______.

files are encrypted and a ransom is demanded to regain access.

What is a positive result a virus can have?

fix problems in a system

An attacker may use a(n) ______ to hide malware such as trojans.

free game, new tool/simple application, music video file

A defining trait of a rootkit is to ______.

gain undetected access in a system

A password should never be stored ______. (Select two)

in plaintext, unencrypted

AI mimics human ______.

intelligence

One tool that hackers use to get sensitive information from victims is/are ______.

keyloggers

Adversarial AI uses AI for ______ intent.

malicious

Malware is a combination of which two words?

malicious and software

Keyloggers will primarily enter a system as ______.

malware

Software that is designed to intentionally cause harm to a device, server, or network is ______.

malware

Which file preceded the shadow file on a Linux system?

passwd

What type of virus comes bundled with an application?

program virus

A ______ attack is a brute-force technique where attackers use a pre-calculated series of hashes.

rainbow table

Viruses and worms are similar forms of malware because both can ______.

replicate

A(n) ______ is a card reader that can be disguised to look like part of an ATM.

skimmer

Viruses and worms can affect a system by ______.

slowing down the system

The type of keylogger that does not require a connection between a keyboard and a computer is a ______.

software keylogger

A ______ attack is a brute-force technique where attackers use a few commonly used passwords.

spraying

Rootkits are hard to discover and remove because ______.

they modify the core of an operating system

Some examples of malware include:

trojans, worms, and bots

One key way to protect against a RAT is to ______.

update anti-malware software

The best way to counteract a computer virus is to ______.

use anti-virus software

One vulnerability that makes computers susceptible to malware is ______.

using old versions of software

Which malware type can self-replicate with the assistance of a host system?

virus

Which malware type can replicate itself without the help of a host system or human interaction?

worm


Set pelajaran terkait

Five Basic Concepts of Democracy

View Set

Steps in which a presynaptic neuron signals a postsynaptic neuron

View Set