Chapter 17: Security Concepts Flashcards

1
Q

Cable locks are used to secure laptops and any device with a ____.

A

USS or Universal Security Slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ____, also known as a metal detector, uses an electromagnetic field to detect metallic objects.

A

magnetometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microsoft’s Active Directory (AD) uses a protocol called ____ to quickly look up objects, such as users, computers, and printers.

A

LDAP or Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microsoft’s Active Directory (AD) works in conjunction with ____, which is the protocol that performs the authentication of users.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Microsoft’s Active Directory (AD) uses a directory partition called the ____ to describe classes of objects and the attributes that define each object.

A

schema partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A/An ____ virus is designed to make itself difficult to detect or analyze by covering themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.

A

armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A/An ____ virus infects the Master Boot Record (MBR) of a hard disk an loads when the computer boots and can re-infect an operating system.

A

boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A/An ____ virus attaches itself to legitimate programs and then creates a program with a different filename extension.

A

companion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A/An ____ virus exploits the enhancements made to many application programs.

A

macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A/An ____ virus attacks your system in multiple ways.

A

multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A/An ____ virus alters programs and databases, and the only way to remove this virus is to reinstall the programs that are infected. If you miss even a single instance of this virus on the victim system, the process will start again and infect the system once more.

A

phage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A/An ____ virus will change form to avoid detection and attempt to hide from your antivirus software.

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A/An ____ bypasses the antivirus software installed on a computer and can directly attack your antivirus software and potentially destroy the virus definition database file.

A

retrovirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A/An ____ virus attempts to avoid detection by masking itself from applications. When a system utility or program runs, it redirects commands around itself to avoid detection.

A

stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A/An ____ is different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ is a form of social engineering in which you ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.

A

Phishing

17
Q

When phishing is combined with VoIP, it becomes known as ____.

A

vishing

18
Q

With ____ phishing, the attacker uses information that the target would be less likely to question because it appears to be coming from a trusted source.

A

spear

19
Q

A/An ____ attack occurs when a threat agent enters a series of escape codes along with a well-crafted SQL statement into a URL. The seamlessly harmless page on the backend that is awaiting the request runs the SQL query along with its normal query.

A

Structured Query Language (SQL) injection

20
Q

____ is a tactic a threat agent uses to deliver a malicious script to the victim by embedding it into a legitimate web page.

A

Cross-Site Scripting or XSS