CH 2 COVERS OBJ 2.1, 2.3, 3.1, 3.2, 4.2, 4.3 Flashcards

1
Q

WHAT IS A BOTNET

A

GROUP OF COMPROMISED COMPUTERS USUALLY WORKING TOGETHER WITH MALWARE THAT WAS INSTALLED BY A WORM OR A TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AN INDIVIDUAL COMPUTER WITHIN A BOTNET IS REFERRED TO AS WHAT

A

ZOMBIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT IS A VIRUS

A

CODE THAT CAN INFECT A COMPUTER’S FILES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS A HONEYPOT

A

COMPUTER THAT IS USED TO LURE ATTACKERS AND QUARANTINE THEIR ATTACK SO IT CAN BE ANALYZED, AND DOES NOT SPREAD TO THE REST OF THE NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT ARE SOME DRAWBACKS TO USING HIDS INSTEAD OF NIDS

A

HIDS MAY USE A LOT OF RESOURCES, WHICH CAN SLOW SERVER PERFORMANCE AND HIDS CANNOT DETECT NETWORK ATTACKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT ATTACKS CAN HIDS DETECT

A

OPERATING SYSTEM ATTACKS AND WILL HAVE A HIGH LEVEL OF DETECTION FOR THOSE ATTACKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT IS A ZOMBIE

A

SYSTEMS THAT HAVE BEEN COMPROMISED WITHOUT THE KNOWLEDGE OF THE OWNER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT COMPUTER SECURITY THREATS CAN BE UPDATED AUTOMATICALLY AND REMOTELY

A

ZOMBIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HOW DOES YOUR COMPUTER BECOME A ZOMBIE

A

COMPUTER MUST BE CONNECTED TO THE INTERNET SO THAT THE HACKER OR MALICIOUS ATTACK CAN MAKE ITS WAY TO THE COMPUTER AND BE CONTROLLED REMOTELY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT IS THE BEST MODE TO USE WHEN SCANNING FOR VIRUSES

A

SAFE MODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT IS A COMMON SYMPTOM OF SPYWARE

A

POP-UP WINDOWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT ARE COMMON SYMPTOMS OF VIRUSES

A

INFECTED FILES, COMPUTER SHUTS DOWN, APPLICATIONS FREEZE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT ARE TWO WAYS TO SECURE THE COMPUTER WITHIN THE BIOS

A

CONFIGURE A SUPERVISOR PASSWORD AND SET THE HARD DRIVE FIRST IN THE BOOT ORDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DAN IS A NETWORK ADMINISTRATOR. ONE DAY HE NOTICES THAT HIS DHCP SERVER IS FLOODED WITH INFORMATION. HE ANALYZES IT AND FINDS THAT THE INFORMATION IS COMING FORM MORE THAN 50 COMPUTERS ON THE NETWORK. WHICH OF THE FOLLOWING IS THE MOST LIKELY REASON

A

A WORM IS MOSTLY LIKELY THE REASON THAT THE SERVER IS BEING BOMBARDED WITH INFORMATION BY THE CLIENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NAME 3 EXAMPLES OF MALICIOUS SOFTWARE

A

ROOTKITS, SPYWARE, AND VIRUSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT TYPE OF ATTACK USES MORE THAN ONE COMPUTER

A

DDOS-DISTRIBUTED DENIAL OF SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WHAT ARE 2 WAYS IN WHICH YOU CAN STOP EMPLOYEES FROM USING USB FLASH DRIVES

A

DISABLE USB IN BIOS AND DISABLE THE USB ROOT HUB IN THE OPERATING SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NAME 2 BLUETOOTH THREATS

A

BLUESNARFING AND BLUEJACKING

19
Q

WHAT IS A MALICIOUS ATTACK THAT EXECUTES AT THE SAME TIME EVERY WEEK

A

A LOGIC BOMB

20
Q

TIM BELIEVES THAT HIS COMPUTER HAS A WORM. THAT IS THE BEST TOOL TO USE TO REMOVE THAT WORM

A

ANTIVIRUS SOFTWARE

21
Q

ACTIVE INTERCEPTION INCLUDES WHAT

A

A COMPUTER PLACED BETWEEN THE SENDER AND THE RECEIVER TO CAPTURE INFORMATION

22
Q

WHAT TYPE OF SCANNER CAN LOCATE A ROOTKIT ON A COMPUTER

A

MALWARE SCANNER

23
Q

WHAT TYPE OF MALWARE DOES NOT REQUIRE A USER TO EXECUTE A PROGRAM TO DISTRIBUTE THE SOFTWARE

24
Q

WHAT IS A WORM

A

SAME AS A VIRUS BUT IT SELF REPLICATES

25
WHAT IS A ROOTKIT
TYPE OF SOFTWARE DESIGNED TO GAIN ADMINISTRATOR LEVEL CONTROL OVER A COMPUTER SYSTEM WITHOUT BEING DETECTED
26
IS HIDS CONSIDER AN INLINE DEVICE
NO BECAUSE THEY RUN ON AN INDIVIDUAL COMPUTER
27
NAME 3 INLINE DEVICES
FIREWALLS, ROUTERS, AND CSU/DSU
28
WHAT IS BLUEJACKING
SENDING OF UNSOLICITED MESSAGES TO BLUETOOTH ENABLED DEVICES SUCH AS MOBILE PHONES
29
WHAT IS BLUESNARFING
UNAUTHORIZED ACCESS OF INFORMATION FROM A WIRELESS DEVICE THROUGH A BLUETOOTH CONNECTION
30
WHITELISTING, BLACKLISTING, AND CLOSING OPEN RELAYS ARE ALL MITIGATION TECHNIQUES ADDRESSING WHAT KIND OF THREAT
SPAM
31
HOW DO MOST NETWORK VIRUSES SPREAD
THROUGH EMAIL
32
WHAT IS THE DIFFERANCE BETWEEN A TROJAN HOUSE AND A WORM
A WORMS SELF REPLICATES WITHOUT USER INTERVENTION AND TROJAN HORSES DO NOT SELF REPLICATE
33
WHAT TYPE OF VIRUS HIDES ITS CODE TO MASK ITSELF
ARMORED VIRUS
34
NAME THE TYPES OF VIRUSES
BOOT SECTOR, MACRO, PROGRAM, POLYMORPHIC, STEALTH, ARMORED, MULTIPARTITE
35
NAME THE TYPES OF VIRUSES
BOOT SECTOR, MACRO, PROGRAM, POLYMORPHIC, STEALTH, ARMORED, MULTIPARTITE
36
WHAT TYPE OF MALWARE APPEARS TO THE USER AS LEGITIMATE BUT ACTUALLY ENABLES UNAUTHORIZED ACCESS TO THE USERS COMPUTER
TROJAN
37
WHAT WOULD BE CONSIDERED DETRIMENTAL EFFECTS OF A VIRUS
TECHNICAL SUPPORT RESOURCES ARE CONSUMED BY INCREASED USER CALLS AND USERS ARE TRICKED INTO CHANGING THE SYSTEM CONFIGURATION
38
TO MITIGATE RISKS WHEN USERS ACCESS COMPANY EMAIL WITH THEIR SMARTPHONE, WHAT SECURITY POLICY SHOULD BE IMPLEMENTED
A PASSWORD SHOULD BE SET ON THE SMARTPHONE AND THE PHONE SHOULD LOCK AFTER A CERTAIN TIME PERIOD
39
YOUR MANAGER WANTS YOU TO IMPLEMENT A TYPE OF INTRUSION DETECTION SYSTEM (IDS) THAT CAN BE MATCHED TO CERTAIN TYPES OF TRAFFIC PATTERNS. WHAT KIND OF IDS IS THIS
SIGNATURE BASED IDS
40
YOU ARE THE SECURITY ADMINISTRATOR FOR YOUR ORGANIZATION. YOU WANT TO ENSURE THE CONFIDENTIALITY OF DATA ON MOBILE DEVICES. WHAT IS THE BEST SOLUTION?
DEVICE ENCRYPTION IS THE BEST SOLUTION TO PROTECT THE CONFIDENTIALITY OF DATA.
41
YOU ARE TASK WITH IMPLEMENTING A SOLUTION THAT ENCRYPTS THE CEO'S LAPTOP. HOWEVER YOU AR NOT ALLOWED TO PURCHASE ADDITIONAL HARDWARE OR SOFTWARE. WHICH OF THE FOLLOWING SOLUTIONS SHOULD YOU IMPLEMENT
TPM OR TRUSTED PLATFORM MODULE IS A CHIP THAT RESIDES ON THE MOTHERBOARD OF THE LAPTOP. IT GENERATE CRYPTOGRAPHIC KEYS THAT ALLOW THE ENTIRE DISK TO BE ENCRYPTED AS IN FULL DISK ENCRYPTION
42
ONE OF YOUR CO-WORKERS COMPLAINS OF VERY SLOW SYSTEM PERFORMANCE AND SAYS THAT A LOT OF ANTIVIRUS MESSAGES ARE BEING DISPLAYED. THE USER ADMITS TO RECENTLY INSTALLING PIRATED SOFTWARE AND DOWNLOADING AND INSTALLING AN ILLEGAL KEYGEN TO ACTIVATE THE SOFTWARE. WHAT TYPE OF MALWARE HAS AFFECTED THE USER'S COMPUTER
A TROJAN WAS PROBABLY INSTALLED AS PART OF THE KEYGEN PACKAGE
43
A SMARTPHONE HAS BEEN LOST. YOU NEED TO ENSURE 100% THAT NO DATA CAN BE RETRIEVED FROM IT. WHAT SHOULD YOU DO?
REMOTE WIPE