CH8 Flashcards

1
Q

Type of Exploits (Common attacks) includes:

A

Ransomware
Viruses
Worms
Trojan horses
Blended threat
Spam
Distributed denial-of-service attacks
Rootkits
Advanced persistent threat
Phishing, spear-phishing, smishing and vishing
Identity theft
Cyberespionage and cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that stops you from using your computer or accessing your data until you meet certain demands such as paying a ransom or sending photos to the attacker

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A piece of programming code (usually disguised as something else) that causes a computer to behave in an unexpected and undesirable manner

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Worms/viruses) Spread to other machines when a computer user shares an infected file or sends an email with a virus-infected attachment

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A harmful program that resides in the active memory of the computer and duplicates itself

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F: Worms can propagate without human intervention.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A seemingly harmless program in which malicious code is hidden

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Worms/Trojan horses) is when a victim on the receiving end is usually tricked into opening it because it appears to be useful software from a legitimate source.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The (Ransomware/Trojan Horse) program’s harmful payload might be designed to enable the attacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or spy on users

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F: Ransomware often creates a “backdoor” on a computer that enables an attacker to gain future access

A

f, trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of Trojan horse that executes when it is triggered by a specific event

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload

A

Blended Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Blended Threat/Spam/Trojan Horse) might use server and Internet vulnerabilities to initiate and then transmit and spread an attack using EXE files, HTML files, and registry keys

A

blended threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The use of email systems to send unsolicited email to large numbers of people

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F: Spam is also an inexpensive method of marketing used by many legitimate organizations

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

software generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.

A

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks

A

Distributed Denial-of-Service Attacks (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

T/F: Distributed Denial-of-Service Attacks keeps target so busy responding to requests that legitimate users cannot get in.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A large group of computers, controlled from one or more remote locations by hackers, without the consent of their owners

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Sometimes called zombies

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

T/F: Botnets are frequently used to distribute spam and malicious code

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Attackers can use the ______ to execute files, access logs, monitor user activity, and change the computer’s configuration

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Symptoms of rootkit infections:

A
  • Computer locks up or fails to respond to input from the keyboard
  • Screen saver changes without any action on the part of the user
  • Taskbar disappears
  • Network activities function extremely slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is _a network attack_ in which an intruder gains access to a *network* and stays undetected with the intention of stealing data *over a long period of time*.
Advanced Persistent Threat (APT)
26
An APT attack advances through the following five phases:
- Reconnaissance - Incursion - Discovery - Capture - Export
27
T/F: Detecting anomalies in outbound data is the best way for administrators to discover that the network has been the target of an DDoS attack.
F, an APT attack
28
The _act of fraudulently_ using *email* to try to get the recipient to reveal personal data.
Phishing
29
T/F: Con artists send legitimate-looking emails urging recipients to take action to avoid a negative consequence or to receive a reward is an example of Spam.
F, example of Phishing
30
is _a variation of phishing_ where fraudulent emails are sent to a certain *organization’s employees*.
Spear-phishing
31
T/F: Spear-phishing is designed to look like they came from high-level executives within organization.
true
32
T/F: Spear-phishing much more precise and narrow.
true
33
is _a variation of phishing_ that involves the use of *texting*.
Smishing
34
is similar to smishing except the victims receive a *voice mail* message telling them to call a phone number or access a Web site.
Vishing
35
The theft of personal information and then used without their permission
Identity Theft
36
is the _unintended release of sensitive data_ or the access of sensitive data by *unauthorized individuals*
Data breach
37
Data breach often results in (identity theft/ransomware/phishing)
identity theft
38
Involves the development of malware that secretly _steals data_ in the computer systems of *organizations*, such as government agencies, military contractors, political organizations, and manufacturing firms
Cyberespionage
39
The _intimidation_ of *government of civilian population* by using information technology to _disable critical national infrastructure_ to *achieve political, religious, or ideological goals*
Cyberterrorism
40
T/F: Cyberterrorists try daily to gain unauthorized access to a number of important and sensitive sites.
True
41
A strong security program begins by:
- Assessing threats to the organization’s computers and network. - Identifying actions that address the most serious vulnerabilities. -Educating users about the risks involved and the actions they must take to prevent a security incident
42
The process of assessing security-related risks to an organization’s computer and networks form both internal and external threats
Risk assessment
43
an organization’s security requirements along with the controls and sanctions needed to meet those requirements.
Security policy
44
T/F: Security Policy outlines what needs to be done and how to do it.
F, what needs to be done not how to do it.
45
T/F: Automated system rules should mirror an organization’s written policies.
true
46
T/F: Organizations should implement a layered security solution to make computer break-ins so difficult that an attacker gives up.
T, If an attacker breaks through one layer, another layer must then be overcome.
47
A _system of software, hardware, or a combination of_ both that *stands guard between an organization’s internal network and the Internet* and limits network access based on the organization’s access policy
Firewall
48
A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
Next-generation firewall (NGFW)
49
T/F: Security policies goes deeper to inspect the payload of packets and match sequences of bytes for harmful activities
F, NGFW goes deeper
50
Scans for specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.
Antivirus software
51
T/F: if a firewall finds a virus, it informs the user and may clean, delete, or quarantine any files, directories, or disks affected by the malicious code.
f, If an antivirus finds a virus...
52
T/F: It is not very crucial that antivirus software be continually updated with the latest virus signatures.
F, it is crucial.
53
Evaluates whether an organization has well-considered security policy in place and if it is being followed.
Security audit
54
The security audit should:
- Review who has access to particular systems and data and what level of authority each user has - Test system safeguards to ensure that they are operating as intended
55
Some organizations also perform a ____________, where individuals try to break through the measures and identify vulnerabilities.
penetration test
56
Software and/or hardware that monitors system and network resources and activities.
Intrusion detection system (IDS)
57
The ___________________ notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
Intrusion detection system (IDS)
58
T/F: A response plan should be developed well in advance of any incident, and it should be approved by the organization’s legal department and senior management.
true.
59
A well-developed response plan helps keep an incident under ________ and _______ control.
technical, emotional.
60
T/F: In a security incident, the primary goal must be to attempt to monitor or catch an intruder.
F, Regain control and limit damage, not to attempt to monitor or catch an intruder