1.1, 1.2 , 1.6 (Malware, Attacks, Impact of Vulnerabilities) Flashcards

1.1, 1.2, 1.6

1
Q

when resources (such as processor and memory) are overloaded

A

resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a result of many DoS and DDos attacks, results in service interruption

A

resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malicious code that attaches itself to an application and runs when application is started

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

often installed by malware on systems to bypass normal authentication methods

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

looks legitimate but is actually malicious

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

can come as pirated software, useful utility, a game, or something else users may be tempted to download

A

trojam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

masquerades as an anti-virus software

A

rogueware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

type of malware that takes control of a user’s system or data

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

installed on users systems without their awareness or consent

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this can slow a system down, resulting in poorer performance

A. Adware
B. Trojan
C. Rootkit
D. Spyware

A

D. Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

group of programs that hides the fact that the system has been infected or compromised by malicious code

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

action that refers to intercepting system-level functions calls, events or messages

A

hooking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

system-level/kernel and can modify system files and system access

A

rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

hide their running processes to avoid detection with hooking techniques

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

practice of sending email to users with purpose of tricking them into revealing personal information or clicking on a link

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security feature that prevents code from executing in memory regions marked as non-executable

A

data execution prevention (DEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

uses existing computer scripts or code to launch attacks

A

script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

type of malware that allows attackers to take control of systems from remote locations

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

sometimes includes a keylogger that records user keystrokes

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

they can remove user privileges and modify system files

A

rootkits

21
Q

Antivirus software uses what to detect known malware??

A

signatures

22
Q

when downloading signatures manually. what can verify the integrity of signature files?

A

hashes

23
Q

these attacks typically include sustained, abnormally high network traffic. (DoS or DDoS?)

A

DDoS

24
Q

these attacks change the source IP address

A

IP spooking

25
Q

attacks that attempt to mislead systems about the actual MAC address of a system.

A

ARP poisoning

26
Q

this attack can modify the IP address associated (google.com, amazon.com, ebay.com) and replace it with the IP address of a malicious web site

A

DNS poisoning

27
Q

these policies help protect against brute force attacks

A

account lockout policies

28
Q

what can thwart dictionary attacks?

A

complex passwords

29
Q

attack where the attacker is able to create a password that produces same hash as user’s actual password

A

birthday attack

30
Q

what can thwart replay attacks?

A

timestamps and sequence numbers

31
Q

takes advantage of session IDs stored in cookies

A

session hijacking

32
Q

attacker utilizes user’s session ID to impersonate the user

A

session hijacking

33
Q

process of rewriting the internal processing of the code without changing its external behavior

A

refactoring code

34
Q

as a result of THIS, an error exposes system memory

A

buffer overflow

35
Q

occurs when an application receives more data than it can handle, receive unexpected data that exposes system memory

A

buffer overflow

36
Q

when successful, this attack causes the system to execute malicious code

A

buffer overflow

37
Q

what can prevent buffer overflow attacks? (not all)

A

input validation

38
Q

from an administrator’s perspective, what is the true solution for buffer overflow vulnerabilities?

A

keeping systems up to date with current patches

39
Q

attacks that allow attackers to capture user information such as cookies

A

cross-site scripting (XSS)

40
Q

what can help prevent cross-site scripting (XSS) attacks?

A

input validation

41
Q

optimized by an application and converted into an executable file

A

compiled code

42
Q

code that is evaluated, interpreted and executed when the code is run

A

runtime code

43
Q

uses a digital signature within a certificate to authenticate and validate software code

A

code signing

44
Q

these attacks provide information about a database, allows attacker to read and modify the data in it

A

SQL injection

45
Q

attacker captures data between two entities, modifies it, and then attempts to impersonate one of the parties by replaying the data

A

replay attacks

46
Q

what is vulnerable to replay attacks? hint: (WPA)

A

WPA with TKIP

47
Q

wireless network where two or more devices connected together without an AP

A

ad hoc

48
Q

designed to prevent attackers from impersonating a website using fraudulent certificates

A

pinning