1.1, 1.2 , 1.6 (Malware, Attacks, Impact of Vulnerabilities) Flashcards

1.1, 1.2, 1.6 (48 cards)

1
Q

when resources (such as processor and memory) are overloaded

A

resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a result of many DoS and DDos attacks, results in service interruption

A

resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malicious code that attaches itself to an application and runs when application is started

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

often installed by malware on systems to bypass normal authentication methods

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

looks legitimate but is actually malicious

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

can come as pirated software, useful utility, a game, or something else users may be tempted to download

A

trojam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

masquerades as an anti-virus software

A

rogueware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

type of malware that takes control of a user’s system or data

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

installed on users systems without their awareness or consent

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this can slow a system down, resulting in poorer performance

A. Adware
B. Trojan
C. Rootkit
D. Spyware

A

D. Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

group of programs that hides the fact that the system has been infected or compromised by malicious code

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

action that refers to intercepting system-level functions calls, events or messages

A

hooking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

system-level/kernel and can modify system files and system access

A

rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

hide their running processes to avoid detection with hooking techniques

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

practice of sending email to users with purpose of tricking them into revealing personal information or clicking on a link

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security feature that prevents code from executing in memory regions marked as non-executable

A

data execution prevention (DEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

uses existing computer scripts or code to launch attacks

A

script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

type of malware that allows attackers to take control of systems from remote locations

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

sometimes includes a keylogger that records user keystrokes

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

they can remove user privileges and modify system files

21
Q

Antivirus software uses what to detect known malware??

22
Q

when downloading signatures manually. what can verify the integrity of signature files?

23
Q

these attacks typically include sustained, abnormally high network traffic. (DoS or DDoS?)

24
Q

these attacks change the source IP address

25
attacks that attempt to mislead systems about the actual MAC address of a system.
ARP poisoning
26
this attack can modify the IP address associated (google.com, amazon.com, ebay.com) and replace it with the IP address of a malicious web site
DNS poisoning
27
these policies help protect against brute force attacks
account lockout policies
28
what can thwart dictionary attacks?
complex passwords
29
attack where the attacker is able to create a password that produces same hash as user's actual password
birthday attack
30
what can thwart replay attacks?
timestamps and sequence numbers
31
takes advantage of session IDs stored in cookies
session hijacking
32
attacker utilizes user's session ID to impersonate the user
session hijacking
33
process of rewriting the internal processing of the code without changing its external behavior
refactoring code
34
as a result of THIS, an error exposes system memory
buffer overflow
35
occurs when an application receives more data than it can handle, receive unexpected data that exposes system memory
buffer overflow
36
when successful, this attack causes the system to execute malicious code
buffer overflow
37
what can prevent buffer overflow attacks? (not all)
input validation
38
from an administrator's perspective, what is the true solution for buffer overflow vulnerabilities?
keeping systems up to date with current patches
39
attacks that allow attackers to capture user information such as cookies
cross-site scripting (XSS)
40
what can help prevent cross-site scripting (XSS) attacks?
input validation
41
optimized by an application and converted into an executable file
compiled code
42
code that is evaluated, interpreted and executed when the code is run
runtime code
43
uses a digital signature within a certificate to authenticate and validate software code
code signing
44
these attacks provide information about a database, allows attacker to read and modify the data in it
SQL injection
45
attacker captures data between two entities, modifies it, and then attempts to impersonate one of the parties by replaying the data
replay attacks
46
what is vulnerable to replay attacks? hint: (WPA)
WPA with TKIP
47
wireless network where two or more devices connected together without an AP
ad hoc
48
designed to prevent attackers from impersonating a website using fraudulent certificates
pinning