Review Questions
Now it's time to check your knowledge. Answer the questions, and then check your answers, which can be found in the Assessments section at the end of the book:
- If I install a freeware program that analyzes my computer and then finds 40,000 exploits and asks me to purchase the full version, what type of attack is this?
- Describe how a fileless virus operates.
- How does an attacker carry out credential harvesting?
- How is pretexting used in an attack?
- How does an invoice scam work?
- How does an attacker carry out password spraying?
- How does an attacker use a malicious USB drive?
- How does artificial intelligence tainting help attackers?
- When I go to a restaurant, how can I protect myself against card cloning?
- What is an on-path attack?
- Why is operational technology vulnerable to attack?
- What is crypto-malware?
- What type of virus replicates itself and uses either ports
4444
or5000
? - What type of virus inserts...