631 Flashcards

1
Q

the steps in the malware removal process are as follows —

A

ID Malware
Quarantine
Disable system restore
Remediate infected system.
Update or install anti-malware software.
Scan and use removal techniques (safe mode, pre-installation environment). Schedule scans, and run updates.
Enable System Restore, create a restore point
Educate the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antivirus software should be installed, but must also be kept —

A

up-to-date with virus definition files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most antivirus applications protect against viruses, worms, and Trojan horses. Some antivirus applications also have integrated —

A

antimalware and antispyware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You should only have one anti-virus application installed and —

A

running on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Antimalware software should also be installed and kept up-to-date. Like antivirus applications, antimalware applications require periodic —

A

updates to the malware definition files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For antispyware software, follow the same guidelines as with antivirus and antimalware software. Unlike antivirus application, you can install multiple —

A

antispyware applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hyperlink spoofing, which is also referred to as Web spoofing, is used by an attacker to persuade the Internet browser to connect to a —

A

fake server that appears as a valid session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The primary purpose of hyperlink spoofing is to gain access to confidential information, such as —

A

PIN numbers, credit card numbers, and bank details of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The link from hyperlink spoofing as it appears on this page is often correct. However, the actual underlying link is usually to the —

A

spoofed site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hyperlink spoofing takes advantage of people using hyperlinks instead of DNS addresses. In most scenarios, the DNS addresses are not visible, and the user is redirected to another fake — .

A

Web site after clicking a hyperlink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A land attack involves sending a spoofed TCP SYN packet with the target host’s IP address and an open —

A

port acting both as a source and a destination to the target host on an open port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The land attack causes the system to either freeze or crash because the machine —-

A

continuously replies to itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICMP packet spoofing is used by a smurf attack to conduct a

A

denial-of-service (DoS) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A smurf is a DoS attack that uses spoofed broadcast ping messages to

A

flood a target host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In such an attack, the attacker sends a large number of ICMP echo packets with a spoofed source IP address similar to that of the target host to IP broadcast addresses. This results in the target host being —

A

flooded with echo replies from the entire network. This also causes the system to either freeze or crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network address hijacking allows the attacker to reroute data traffic from a —

A

network device to a personal computer.

17
Q

Network address hijacking, which is also referred to as session hijacking, enables an attacker to —

A

capture and analyze the data addressed to a target system.

18
Q

The attacker can gain access to critical resources and user credentials, such as passwords, and unauthorized access to the —

A

critical systems of an organization.

19
Q

Session hijacking involves taking control of an existing connection after the —

A

user has successfully created an authenticated session.

20
Q

Automated System Recovery in not an option listed in the

A

Advanced Boot Options menu.

21
Q

The options for the advanced boot options menu are as follows: —

A
Safe Mode     
Safe Mode with Networking      
Safe Mode with Command Prompt      
Enable Boot Logging        
Enable low-resolution video 640x480     
Last Known Good Configuration       
Directory Services Restore Mode      
Debugging Mode      
Disable automatic restart on system failure      
Disable Drive Signature Enforcement
22
Q

____________________uses a minimal set of device drivers and services when Windows boots. All three variants of _________________ use vga.sys as the video device driver. —

A

Safe Mode

23
Q

uses a minimal set of device drivers and services when Windows boot, but includes device drivers to enable networking. —

A

Safe Mode with Networking

24
Q

is the same as Safe Mode, except it only boots to the command prompt. This mode does NOT provide a GUI interface. —

A

Safe Mode with Command Prompt -