1C Flashcards

1
Q

___ ___ is software or scripts written to intentionally cause undesired effects such as security breaches or damage to a system.

A

Malicious Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious code includes a broad category of related terms including…?

A

Attack Scripts
Viruses
Worms
Trojan Horses
Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ is software designed to infiltrate or damage a computer system without the owner’s informed consent.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Many computer users are unfamiliar with the term, and often use the term, “___ ___” for all types of malware, including viruses.

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is considered malware because of the perceived intent of the creator rather than any features of the ____ itself. Malicious ____ and infectious programs created with malicious intent have been
present from the time ____ came into existence.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware is not the same as ____ ____. ____ ____ is software which has a legitimate purpose but incidentally contains harmful
program bugs.

A

Defective software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most common pathways that malware takes from criminals to users (known as attack vectors) are through ___ and ___.

A

email and World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ ___ are bits of computer programming, or code, that hide in computer programs or on the boot sector of storage devices

A

Computer viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The primary purpose of a ____ is to reproduce itself as often as possible and thereby disrupt the operation of the infected
computer or program. Once activated, a ___ can range from being simply annoying to catastrophic.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses are written by people with intent to do ___ and can be classified into many categories, based on how they propagate themselves and the nature of their behavior.

A

harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four types of viruses?

A
  1. Boot Sector Virus
  2. File Infector Virus
  3. Macro Virus
  4. Logic Bomb
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first type, called a “boot-sector virus,” resides in the first sector of a…?

A

disk or USB drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following describes which type of virus?

The virus executes when the computer is booted. It controls the boot sequence and determines which partition the computer boots from. A ___ ___virus is extremely dangerous. Once the boot code on the drive is infected, the virus will be loaded into memory on every startup. From memory, the boot virus can spread to every disk that the system reads. A common method of transmitting viruses from one computer to another is through the distribution of removable media like compact disc (CD) or USB drive. Each time the infected media gets used on a new device; the virus replicates itself onto the new drive. Any disk can cause infection if it is in the drive when the computer boots up. The virus can also be spread across networks
from file downloads and e-mail file attachments.

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following describes which type of virus?

The second type of virus is the “____ ____,” also known as an executable virus or parasitic virus. ____ ____ operate in memory and infect executable files. Such a virus attaches itself to a file or program and activates any time the file is used. When the program loads, the virus is loaded as well. Other ____ ____ viruses arrive as wholly contained programs or scripts sent as an attachment to an e-mail. Various subcategories of file infectors exist.

A

File Infector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The following describes which type of virus?

Most applications today support ____, which are used to automate a task within the software application. A ____ virus is code written using a ____ language which performs a malicious action, such as deleting files or e-mailing everyone in your address book. The ____ is usually created within a file and triggered automatically when someone opens the file. ____ viruses infect files, not entire host computers or networks.

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following describes which type of virus?

A ___ ___ is a type of virus planted on the system by installing a piece of software that contains some code that will not execute until a certain event occurs, such as a specific date.

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

One infected computer in an organization could easily infect all the computers in the organization by a single user passing around a
copy of the latest program. ___ ___ are often the primary means for convenient file transfers.

A

Flash drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

One of the most common methods of spreading a virus is through ___.

A

email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ___ ___ is a program that a user is tricked into installing. The software that the user intended to download works exactly as expected. But there is additional software embedded inside the legitimate code that the user does not know about and would not give permission to install if they knew. ___ ___ allow unauthorized access to an infected host by opening a back door on the infected machine which allows a hacker to connect to the system remotely and take control of it.

A

Trojan horse

20
Q

A ___ is like a virus except that ___ require no user intervention to self-replicate. ___ can infect a network in several ways, such as by using certain vulnerable network ports/protocols, by opening infected e-mail messages, and by inserting infective flash drives into the host computer.

A

worm

21
Q

The effect of viruses may cause data loss, but some viruses are designed specifically to delete files or issue a physically harmful
series of instructions to hard drives. Such viruses are termed ____.

A

destructive

22
Q

What are common symptoms of computer virus infection?

A
  • The computer will not boot.
  • The data is scrambled or corrupted.
  • The computer operates erratically.
  • A partition is lost.
  • The hard drive is reformatted.
  • Programs suddenly open and close without your input.
  • Warnings and error messages are displayed at unusual times.
23
Q

The most common symptom of an infection on a network is one or more workstations with ___ ___.

A

erratic errors

24
Q

What are some other types of malware that you should be aware of?

A
  1. Ransomware
  2. Spyware
  3. Adware
  4. Rootkit
25
Q

___ is a type of malware that prevents or limits users from accessing their system. Attackers can encrypt a victim’s entire system, specific files, or they may lock the system’s screen until the victim pays a specified ransom to have their data unencrypted or unlocked by the attacker.

A

Ransomware

26
Q

___ is hidden software that monitors and collects information about a user and their activities and then sends that information to a remote system for a hacker to review. For example, ____ could collect information about the websites you visit. ____ has also been known to make changes to computer systems such as redirecting browsers and slowing down network connections.

A

Spyware

27
Q

___ is software that automatically loads advertisements on the screen, typically in the form of pop-up windows.

A

Adware

28
Q

A ___ is software, typically hidden from the administrator, that is installed on a system by a hacker to give that hacker privileged access to the system.

A

Rootkit

29
Q

___ ___ stop unauthorized users (also known as intruders) from accessing any part of a computer system.

A

Preventative measures

30
Q

What are the different types of preventative measures?

A
  1. Vulnerability Scanning
  2. Software patching
  3. User-awareness training
  4. Firewalls
  5. Anti-spyware
  6. Proxy Servers/Web Content Filters
  7. Mail Gateway
31
Q

___ ___ mimics malicious network activity that hosts could encounter on a network. Routine scanning results identify hosts that are vulnerable to attacks. System administrators should remediate these vulnerabilities by patching or otherwise changing system configurations.

A

Vulnerability scanning

32
Q

___ is the process of repairing a vulnerability or a flaw that is identified after the release of an application. Newly released ___ can fix bugs, help to enhance applications with new features, and
fix security vulnerabilities

A

Software patching

33
Q

All users of the Air Force Network are required to complete ___ ___ ___ upon initial account creation and annually after that. This training informs users of common pitfalls that can cause system vulnerabilities and what they can do to mitigate them.

A

User-awareness training

34
Q

A ____ restricts data communication traffic to and from a network it’s connected to. ____ protect network resources from outside threats

A

Firewalls

35
Q

Any software that covertly gathers user information through the user’s Internet connection without their knowledge, usually for advertising purposes, is spyware. Spyware does not intend to cause damage to the system but rather presents a privacy threat. ___ ____ prevents spyware from collecting information about the user.

A

Anti-spyware

36
Q

A ____ resides between a user’s computer and the Internet. It provides security, privacy, and web filtering. ____ servers are often used as part of a firewall.

A

Proxy Servers/Web Content Filters

37
Q

A ___ ___ is a server within an organization’s demilitarized zone (DMZ) that sends and receives email for the organization. The ___ ___ can be set up to scan and filter out files with problematic file extensions, viruses, and spam. The gateway then forwards email to the internal email server to be distributed to internal clients.

A

Mail gateway

38
Q

___ ___ determine whether someone attempted to break into a system and if the intrusion was successful. If so, it shows what the attacker may have done.

A

Detection Measures

39
Q

What are the two types of detection measures?

A

Anti-virus software
Monitor Logs

40
Q

___ software is your system’s protection against viruses. Your system can contract viruses from websites, e-mail attachments, etc. ___ programs inspect the contents of each file. They search for a virus signature, that is, specific patterns that match a malicious profile of something known to be harmful. For each file that matches a signature, the ___ program provides options on how to respond, such as removing the offending patterns, quarantining the file, or deleting the file.

A

Anti-virus software

41
Q

Administrators should check logs daily for signs of security compromise. Logs from firewalls, IDSs/IPSs, DNS servers, and proxy servers can be centralized using a syslog host, which collects logs
from various devices and systems.

A

Monitor Logs

42
Q

What is a counter measure?

A

Response

43
Q

___ involves knowing the value of your data and the impact upon day-to-day operations if specific systems become unavailable or compromised. Recovery actions may run the gamut from simple
upgrade of protective appliances to notification of legal authorities, counterattacks, and the like.

A

Response

44
Q

Steps of the response phase of an attack may include tasks such as…?

A
  1. Defining the attack
  2. Informing users of the attack
  3. Contain the intrusion
  4. Identifying the source
  5. Notifying all interested parties
  6. Compiling detailed repair reports
45
Q

___ are standardized technical processes, techniques, checklists, and
forms. Anyone in an organization responding to an incident should follow the organization’s ___.

A

SOP

46
Q

What does SOP stand for?

A

Standard Operating Procedures

47
Q

An SOP should be comprehensive and detailed, and following it should minimize errors. For an SOP to be useful, it must be developed ___ an incident occurs and should be updated as required. Finally, an SOP should be tested to validate its usefulness.

A

before