Chapter 14 Security Threats Flashcards
Attackers are frequently trying to get information from your company, trying every possible combination of numbers and letters to that could be in a password. This is known as a? 482
Brute Force attack
What are the 3 session hijacking methods used by attackers ? 482
Session fixation, session sidejacking, cross site scripting
Hackers use a process called double tagging to manipulate traffic on a VLAN tag. With this, the fake tag is read and the frame is sent to the VLAN to which the hackers has intended for it to go. This process is known as what? 482
VLAN Hopping
You have just open a email that have a “love bug” attached to it. Now this thing is bypassing all of your company security, and spreading across your network. What is the love bug? 484
A Virus
T/F all viruses operate in the same manner?
False
What are the three well known viruses that attacks your security mainly? 484
Chernobyl, Michelangelo, Melissa, I love you and love bug
This virus is among some of the popular ones in which it replaces codes of a program with its own. What is this virus ? 485
File Virus
T/F because you have a Mac device you are immune to virus attack.
False, it’s just that it’s hard to make viruses for that OS
What type of virus attacks the memory, disk files and boot sector of your machine? 486
A multipartite virus
What is the name of the virus that remains dormant until the next reboot? 487
Tequila virus
Your network is attacked by a newly developed virus that has not been identified by any of the antivirus programs you have installed. This condition is known as what? 487
Zero Day Attacks
It is often said that you should “keep your enemies closer”. So in a business, a person that is more threat to your organization and is more capable of exploiting sensitive files than a remote hacker is ? 487
Employee or just someone working within the organization that has access to the resources
T/F unnecessary running services cause no threat to you or your system because it offers no information to hackers. Hence the name unnecessary.
False. Hackers will research all the possible vulnerabilities presented by that service to get to the target
Normally hackers will try to get in a server to which they would have no access based on their IP address, but now, hackers have a Method in which they can change their IP address to appear as one of the machine that would regularly visit the servers. This process is known as what? 481
Spoofing