1. Which is an example of social engineering?

A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.

2. What is a significant characteristic of virus malware?

A virus is malicious code that is attached to a legitimate program or executable file, and requires specific activation, which may include user actions or a time-based event. When activated, a virus can infect the files it has not yet infected, but does not automatically propagate itself to other systems. Self-propagation is a feature of worms. In addition to being distributed over the Internet, viruses are also spread by USB memory sticks, CDs, and DVDs.

3. Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?

An access attack tries to affect services that affect entry into accounts, databases, and other sensitive information. Access attacks commonly involve a dictionary ths is used to guess a specific user password. A brute-force access attack would try to access an account via repeated attempts.

4. What is the purpose of a reconnaissance attack on a computer network?

Preventing users from accessing network resources is a denial of service attack. Being able to steal data from the network servers may be the objective after a reconnaissance attack gathers information about the target network and system. Redirecting data traffic so it can be monitored is a man-in-the middle attack.

5. To which category of security attacks does man-in-the-middle belong?

With a man-in-the-middle attack, a threat actor is positioned in between two legitimate entities in order to read, modify, or redirect the data that passes between the two parties.

6. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.

7. What is the primary goal of a DoS attack?

A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.

8. What is the best description of Trojan horse malware?

The best description of Trojan horse malware, and what distinguishes it from viruses and worms, is that it appears as useful software but hides malicious code. Trojan horse malware may cause annoying computer problems, but can also cause fatal problems. Some Trojan horses may be distributed over the Internet, but they can also be distributed by USB memory sticks and other means. Specifically targeted Trojan horse malware can be some of the most difficult malware to detect.

9. Which tool is used to provide a list of open ports on network devices?

The Nmap tool is a port scanner that is used to determine which ports are open on a particular network device. A port scanner is used before launching an attack.

10. When describing malware, what is a difference between a virus and a worm?

Malware can be classified as follows:

  • Virus (self replicates by attaching to another program or file)
  • Worm (replicates independently of another program)
  • Trojan Horse (masquerades as a legitimate file or program)
  • Rootkit (gains privileged access to a machine while concealing itself)
  • Spyware (collects information from a target system)
  • Adware (delivers advertisements with or without consent)
  • Bot (waits for commands from the hacker)
  • Ransomware (holds a computer system or data captive until payment is received)

11. What is the main goal of using different evasion techniques by threat actors?

Many threat actors use stealthy evasion techniques to disguise an attack payload because  the malware and attack methods are most effective if they are undetected. The goal is to prevent detection by network and host defenses.

12. What is the purpose of a rootkit?

Malware can be classified as follows:

  • Virus (self replicates by attaching to another program or file)
  • Worm (replicates independently of another program)
  • Trojan Horse (masquerades as a legitimate file or program)
  • Rootkit (gains privileged access to a machine while concealing itself)
  • Spyware (collects information from a target system)
  • Adware (delivers advertisements with or without consent)
  • Bot (waits for commands from the hacker)
  • Ransomware (holds a computer system or data captive until payment is received)ent)

13. In what way are zombies used in security attacks?

Zombies are infected computers that make up a botnet. The zombies are used to deploy a distributed denial of service (DDoS) attack.