Chapter 2: Attacks, Concepts, and Techniques
star
star
star
star
star
Last updated about 2 years ago
11 questions
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Spear Phishing | arrow_right_alt | replicate themselves by independently exploiting vulnerabilities in networks |
Spyware | arrow_right_alt | carries out malicious operations under the guise of a desired operation |
Tailgating | arrow_right_alt | malicious executable code that is attached to other executable files |
Ransomware | arrow_right_alt | modify the operating system to create a backdoor |
Worm | arrow_right_alt | hold a computer system or the data captive until a payment is made |
Social Engineering | arrow_right_alt | deliver advertisements, usually comes with spyware |
Brute-Force Attacks | arrow_right_alt | track and spy on the user |
Virus | arrow_right_alt | The attacker manipulates a person who knows the password into providing it. |
Phishing | arrow_right_alt | The attacker tries several possible passwords in an attempt to guess the password. |
Trojan Horse | arrow_right_alt | an attacker quickly follows an authorized person into a secure location. |
Rootkit | arrow_right_alt | a highly targeted individual phishing attack |
Adware | arrow_right_alt | trick the recipient into installing malware on their device or sharing personal or financial information |