622 Flashcards
A _____________is a collection of programs that grants a hacker admin access to a computer or network. The hacker first gains access to a single system, and then uploads the _________to the hacked system. An example of a _________ is a ___________module that modifies file system operations. —
rootkit / rootkit / rootkit / system-level kernel
____________is a software application that displays advertisements while the application is executing. —
Adware
Some adware is also __________if it monitors your Internet usage and personal information. Some adware will even allow credit card information theft. —
spyware
__________ often uses tracking cookies to collect and report a user’s activities. Not all _________ is adware, and not all adware is ________. To define a program as _________requires that your activities are monitored and tracked; to define a program as adware requires that advertisements are displayed. —
Spyware
A worm is a program that spreads itself through —
network connections.
Malware is the term used to describe a group of malicious software applications that include: —
Viruses Worms Spyware Trojans Rootkits Backdoors Logic bombs Botnets
Biometric locks offer the most protection from loss or theft of the access device. They are based on the security concept of —
something you are
Biometrics match a users uniquely identifiable physical attribute to a previously stored value. They are among the most
secure physical security measures
Server locks restrict access to the devices in the server cabinet. They can be locked through a key in the same manner that door —
locks can be secured
USB locks are USB flash drives that contain an ______________that unlocks the computer. When the USB drive is inserted into the port, the computer is unlocked. When the USB drive is removed, the computer is locked. —
electronic key
Key fobs contain a hardware token and are often used for______________ authentication. They are easily lost or stolen. —
Near-Field Communications (NFC
You should deploy biometrics, smart cards, and strong passwords. This covers three different factors of authentication: –
something you are
something you have
something you know
Biometrics devices help verify users’ identities against unique physical characteristics. Biometric devices include —
retinal scanners
hand scanners
fingerprint.
Smart cards, which are a type of identification badge, are used to give people access to buildings, doors and computers and parking lots. Smart cards are inserted into a computer or a smart card reader. Although you cannot duplicate them, they can be easily stolen, so modern smart cards have users enter —
passwords or PINs to activate them.
Usernames, strong passwords, and a PIN are all things you know, so this solution would not be considered —
multifactor authentication.