Malware, Fishing, Brute-Force

Cards (27)

  • What is a network policy?
    A set of rules users must adhere to for appropriate working behaviors.
  • What are user access levels?

    Different groups of users with varying degrees of system access.
  • What is penetration testing?

    Permissioned attempts to hack a system to reveal weaknesses.
  • What is malware?

    Any software that can harm a computer or user.
  • What is the primary aim of viruses?

    To cause physical harm to a computer system.
  • How do standard viruses operate?

    They hide in files and replicate to spread to other programs.
  • What distinguishes worms from standard viruses?

    Worms replicate without necessarily damaging data.
  • What is a Trojan virus?

    A program that appears useful but causes harm in the background.
  • What is the purpose of spyware?

    To spy on users and collect their personal information.
  • What is a key logger?

    A type of spyware that records every keystroke made by the user.
  • What does adware aim to do?

    To download unwanted adverts and collect marketing information.
  • How does pharming work?

    It changes the IP address in the DNS to redirect users to fake websites.
  • What is scareware?

    Malware that pretends to detect a virus to sell software.
  • What is ransomware?

    Malware that locks a computer and demands payment to unlock it.
  • What are rootkits?

    Tools that allow criminals to access a computer at an administrator level.
  • What is phishing?

    A method to acquire sensitive information through impersonation.
  • How do phishing attacks typically occur?

    Through emails or phone calls impersonating legitimate companies.
  • What is a common sign of a phishing email?

    Poor spelling and grammar.
  • What is a brute force attack?

    A method where criminals use trial and error to guess passwords.
  • How can brute force attacks be mitigated?

    By locking accounts after multiple unsuccessful login attempts.
  • What is a Denial of Service (DoS) attack?

    A method that overwhelms a server with traffic to crash it.
  • How do hackers intercept data?

    By using hardware and software to monitor network traffic.
  • What is the purpose of encryption in data transmission?

    To make data unreadable if intercepted.
  • What does SQL stand for?

    Structured Query Language.
  • How do SQL injections work?

    By adding SQL code to manipulate database queries.
  • What is an example of an SQL statement?

    SELECT account WHERE username = "bjones" AND password = "pa$$w0rd"
  • What measures do websites take against SQL injections?

    They validate that only a password is entered without extra SQL code.