CH8 Flashcards

1
Q

Type of Exploits (Common attacks) includes:

A

Ransomware
Viruses
Worms
Trojan horses
Blended threat
Spam
Distributed denial-of-service attacks
Rootkits
Advanced persistent threat
Phishing, spear-phishing, smishing and vishing
Identity theft
Cyberespionage and cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that stops you from using your computer or accessing your data until you meet certain demands such as paying a ransom or sending photos to the attacker

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A piece of programming code (usually disguised as something else) that causes a computer to behave in an unexpected and undesirable manner

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Worms/viruses) Spread to other machines when a computer user shares an infected file or sends an email with a virus-infected attachment

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A harmful program that resides in the active memory of the computer and duplicates itself

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F: Worms can propagate without human intervention.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A seemingly harmless program in which malicious code is hidden

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Worms/Trojan horses) is when a victim on the receiving end is usually tricked into opening it because it appears to be useful software from a legitimate source.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The (Ransomware/Trojan Horse) program’s harmful payload might be designed to enable the attacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or spy on users

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F: Ransomware often creates a “backdoor” on a computer that enables an attacker to gain future access

A

f, trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of Trojan horse that executes when it is triggered by a specific event

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload

A

Blended Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Blended Threat/Spam/Trojan Horse) might use server and Internet vulnerabilities to initiate and then transmit and spread an attack using EXE files, HTML files, and registry keys

A

blended threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The use of email systems to send unsolicited email to large numbers of people

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F: Spam is also an inexpensive method of marketing used by many legitimate organizations

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

software generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.

A

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks

A

Distributed Denial-of-Service Attacks (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

T/F: Distributed Denial-of-Service Attacks keeps target so busy responding to requests that legitimate users cannot get in.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A large group of computers, controlled from one or more remote locations by hackers, without the consent of their owners

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Sometimes called zombies

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

T/F: Botnets are frequently used to distribute spam and malicious code

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Attackers can use the ______ to execute files, access logs, monitor user activity, and change the computer’s configuration

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Symptoms of rootkit infections:

A
  • Computer locks up or fails to respond to input from the keyboard
  • Screen saver changes without any action on the part of the user
  • Taskbar disappears
  • Network activities function extremely slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data over a long period of time.

A

Advanced Persistent Threat
(APT)

26
Q

An APT attack advances through the following five phases:

A
  • Reconnaissance
  • Incursion
  • Discovery
  • Capture
  • Export
27
Q

T/F: Detecting anomalies in outbound data is the best way for administrators to discover that the network has been the target of an DDoS attack.

A

F, an APT attack

28
Q

The act of fraudulently using email to try to get the recipient to reveal personal data.

A

Phishing

29
Q

T/F: Con artists send legitimate-looking emails urging recipients to take action to avoid a negative consequence or to receive a reward is an example of Spam.

A

F, example of Phishing

30
Q

is a variation of phishing where fraudulent emails are sent to a certain organization’s employees.

A

Spear-phishing

31
Q

T/F: Spear-phishing is designed to look like they came from high-level executives within organization.

A

true

32
Q

T/F: Spear-phishing much more precise and narrow.

A

true

33
Q

is a variation of phishing that involves the use of texting.

A

Smishing

34
Q

is similar to smishing except the victims receive a voice mail message telling them to call a phone number or access a Web site.

A

Vishing

35
Q

The theft of personal information and then used without their permission

A

Identity Theft

36
Q

is the unintended release of sensitive data or the access of sensitive data by unauthorized individuals

A

Data breach

37
Q

Data breach often results in (identity theft/ransomware/phishing)

A

identity theft

38
Q

Involves the development of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms

A

Cyberespionage

39
Q

The intimidation of government of civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals

A

Cyberterrorism

40
Q

T/F: Cyberterrorists try daily to gain unauthorized access to a number of important and sensitive sites.

A

True

41
Q

A strong security program begins by:

A
  • Assessing threats to the organization’s computers and network.
  • Identifying actions that address the most serious vulnerabilities.
    -Educating users about the risks involved and the actions they must take to prevent a security incident
42
Q

The process of assessing security-related risks to an organization’s computer and networks form both internal and external threats

A

Risk assessment

43
Q

an organization’s security requirements along with the controls and sanctions needed to meet those requirements.

A

Security policy

44
Q

T/F: Security Policy outlines what needs to be done and how to do it.

A

F, what needs to be done not how to do it.

45
Q

T/F: Automated system rules should mirror an organization’s written policies.

A

true

46
Q

T/F: Organizations should implement a layered security solution to make computer break-ins so difficult that an attacker gives up.

A

T, If an attacker breaks through one layer, another layer must then be overcome.

47
Q

A system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet and limits network access based on the organization’s access policy

A

Firewall

48
Q

A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

A

Next-generation firewall (NGFW)

49
Q

T/F: Security policies goes deeper to inspect the payload of packets and match sequences of bytes for harmful activities

A

F, NGFW goes deeper

50
Q

Scans for specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.

A

Antivirus software

51
Q

T/F: if a firewall finds a virus, it informs the user and may clean, delete, or quarantine any files, directories, or disks affected by the malicious code.

A

f, If an antivirus finds a virus…

52
Q

T/F: It is not very crucial that antivirus software be continually updated with the latest virus signatures.

A

F, it is crucial.

53
Q

Evaluates whether an organization has well-considered security policy in place and if it is being followed.

A

Security audit

54
Q

The security audit should:

A
  • Review who has access to particular systems and data and what level of authority each user has
  • Test system safeguards to ensure that they are operating as intended
55
Q

Some organizations also perform a ____________, where individuals try to break through the measures and identify vulnerabilities.

A

penetration test

56
Q

Software and/or hardware that monitors system and network resources and activities.

A

Intrusion detection system (IDS)

57
Q

The ___________________ notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

A

Intrusion detection system (IDS)

58
Q

T/F: A response plan should be developed well in advance of any incident, and it should be approved by the organization’s legal department and senior management.

A

true.

59
Q

A well-developed response plan helps keep an incident under ________ and _______ control.

A

technical, emotional.

60
Q

T/F: In a security incident, the primary goal must be to attempt to monitor or catch an intruder.

A

F, Regain control and limit damage, not to attempt to monitor or catch an intruder