Chapter 14 Security Threats Flashcards

1
Q

Attackers are frequently trying to get information from your company, trying every possible combination of numbers and letters to that could be in a password. This is known as a? 482

A

Brute Force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 session hijacking methods used by attackers ? 482

A

Session fixation, session sidejacking, cross site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers use a process called double tagging to manipulate traffic on a VLAN tag. With this, the fake tag is read and the frame is sent to the VLAN to which the hackers has intended for it to go. This process is known as what? 482

A

VLAN Hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have just open a email that have a “love bug” attached to it. Now this thing is bypassing all of your company security, and spreading across your network. What is the love bug? 484

A

A Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F all viruses operate in the same manner?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three well known viruses that attacks your security mainly? 484

A

Chernobyl, Michelangelo, Melissa, I love you and love bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This virus is among some of the popular ones in which it replaces codes of a program with its own. What is this virus ? 485

A

File Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F because you have a Mac device you are immune to virus attack.

A

False, it’s just that it’s hard to make viruses for that OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of virus attacks the memory, disk files and boot sector of your machine? 486

A

A multipartite virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the name of the virus that remains dormant until the next reboot? 487

A

Tequila virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your network is attacked by a newly developed virus that has not been identified by any of the antivirus programs you have installed. This condition is known as what? 487

A

Zero Day Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is often said that you should “keep your enemies closer”. So in a business, a person that is more threat to your organization and is more capable of exploiting sensitive files than a remote hacker is ? 487

A

Employee or just someone working within the organization that has access to the resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F unnecessary running services cause no threat to you or your system because it offers no information to hackers. Hence the name unnecessary.

A

False. Hackers will research all the possible vulnerabilities presented by that service to get to the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Normally hackers will try to get in a server to which they would have no access based on their IP address, but now, hackers have a Method in which they can change their IP address to appear as one of the machine that would regularly visit the servers. This process is known as what? 481

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly