Chapter 17 Student 12 Flashcards

1
Q

What type of attack is a process in which an attacker attempts to acquire information about your network and system by social means (over the phone, email, or talking on the phone)? Pg 809

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This security threat are software programs that have the ability to hide certain things from the operating system; they do so by have admin - level access. Pg 810

A

Rookits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This form of social engineering looks like someone is asking for a piece of information that you are missing. They would make it look as a legitimate request, usually asking for a person’s account number, user ID, etc. Pg 810

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one of the best countermeasures to Phishing? Pg 811

A

Simply mouse over the Click Here link and read the URL. If the URL is not what you think it is, then you are being Phished.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T or F, vishing, is phishing but over a VOIP phone. Pg 811

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This form of social engineering involves nothing more than watching someone when they enter sensitive data. PG 811

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does Spyware work? pg 811

A

Spyware is spread to machines by users who inadvertently ask for it. The user’s don’t know that they have asked for it, but have done so by downloading other programs, visiting infected sites and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the symptoms of a Virus or a malware infection? Pg 812

A

Many viruses will announce that you’re infected as soon as they gain access to your system. They may take control of your system and flash annoying messages on your screen or destroy your hard disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T or F, you may have a Virus if your system mysteriously shuts itself down, or starts itself up. Pg 812

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What two things a virus will try to accomplish? Pg 813

A

Render your system inoperable, and spread to other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are viruses spread today by email? Pg 813

A

The infected system attaches a file to any email that you send to another user. The recipient opens the file, and the virus infects the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the best defense against a virus? Pg 814

A

Up to date antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This virus protects itself with protective code that can stop debuggers or disassemblers from examining critical elements of the virus. Pg 814

A

Armored Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This virus attaches itself to legitimate programs, then creates a program with a different filename extension. Pg 815

A

Companion Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This virus alters programs and databases. The only way to remove this virus is to wipe the drive and reinstall . Pg 815.

A

Phage Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This virus changes to avoid detection. Pg 816

A

Polymorphic Virus

17
Q

This virus attacks or bypasses the antivirus software installed on a computer. 816

A

Retrovirus

18
Q

This virus attempts to avoid detection by masking itself from applications. Pg 816

A

Stealth virus

19
Q

What’s the difference between a Virus and a Worm? Pg 817

A

A worm can reproduce itself.

20
Q

This program can enter a system or network under the guise of another program. pg 818

A

Trojan Horse