Your computer is currently displaying a window demanding payment to unlock your computer, and you cannot exit the window. What type of malware is on your computer?
What is Ransomware?
Worms often use this to spread.
What is a network?
Minh liked studying math and statistics in college and wants to go into a cybersecurity job. He should become a _____
Cryptographer
This type of hacker normally has a security job by day, but hacks illegally during their own time.
What is a Grey Hat hacker?
Your internet is fine, but you cannot connect to one specific website. The website may be suffering from this kind of attack.
What is a DoS or DDoS attack?
This is often used by spyware to capture what you type.
What is a Keylogger?
You download a flashlight app on your phone, and within minutes you get spammed by ad notifications. The app is an example of this type of malware.
What is a Trojan and/or Adware.
As you browsing the internet, you start getting pop ups from within your browser alerting you that you have been infected with a virus. These pop ups are an example of this kind of Social Engineering attack.
What is Scareware?
This is a method of listening to a victim's voicemail without using their phone.
What is Spoofing?
Julie found a bug in a database program that could give her unauthorized access to employee information. This is a(n)
Exploit
WannaCry is an example of this type of malware.
What is Ransomware?
This type of malware does not need any human interaction for it to self-replicate.
What is a Worm?
While working at the office, you happen to see a coworker badge into the building, but before the door can fully shut, an unknown person catches the door and lets himself in. You just witnessed what type of Social Engineering attack?
What is Tailgating?
Security engineers must continuously update their skills and knowledge on the following system.
UNIX/Windows
You go to your local coffee shop but do not have a signal, so you decide to connect to the shop's WiFi to check your bank balance. Later that week, your bank account has been emptied. You were probably a victim of this type of cyber attack.
What is a Man in the Middle attack?
This type of malware depends on a host application to be running for it to work.
What is a Virus?
The main issue with this type of malware, besides being annoying, is the erosion of the victim's privacy.
What is Adware?
Fred was able to follow a network engineer into the server room by following him closely as he opened and closed the doors.
Social Engineering
This tool is an open source intelligence and forensics application used for the mining and gathering of information, as well as displaying this information in an easy to understand format.
What is Maltego?
You are doing some research for a homework assignment and visit a lot of new websites that bombard you with ads. In the next few days, you notice your computer is slowing down a lot. You were probably a victim of this type of cyber attack.
What is a Drive-By attack?
This type of malware is difficult to spot, but it can easily slow down your internet/network connection.
What is a Worm or Bot?
This type of malware gives an attack Root/Administrative privileges on the victim's computer.
What is a Rootkit?
You are approached by a friendly stranger who strikes up an innocent conversation with you. This conversation quickly turns personal, but the stranger always answers his own questions first. The stranger may be attempting this kind of Social Engineering attack.
What is a Quid Pro Quo attack?
George made a fake banking link where, if the victim clicks on it and logs in with their information, gives him their account information.
Data Theft
You are attempting to crack some password hashes. You have attempted to use a Rainbow Table, but are getting no matches even though you know that one of the passwords is 123. These hashes have gone through this kind of process.
What is Salt or Salting process?