Chapter 17 Student 12 Flashcards
What type of attack is a process in which an attacker attempts to acquire information about your network and system by social means (over the phone, email, or talking on the phone)? Pg 809
Social Engineering
This security threat are software programs that have the ability to hide certain things from the operating system; they do so by have admin - level access. Pg 810
Rookits
This form of social engineering looks like someone is asking for a piece of information that you are missing. They would make it look as a legitimate request, usually asking for a person’s account number, user ID, etc. Pg 810
Phishing
What is one of the best countermeasures to Phishing? Pg 811
Simply mouse over the Click Here link and read the URL. If the URL is not what you think it is, then you are being Phished.
T or F, vishing, is phishing but over a VOIP phone. Pg 811
True
This form of social engineering involves nothing more than watching someone when they enter sensitive data. PG 811
Shoulder Surfing
How does Spyware work? pg 811
Spyware is spread to machines by users who inadvertently ask for it. The user’s don’t know that they have asked for it, but have done so by downloading other programs, visiting infected sites and so on.
What are the symptoms of a Virus or a malware infection? Pg 812
Many viruses will announce that you’re infected as soon as they gain access to your system. They may take control of your system and flash annoying messages on your screen or destroy your hard disk.
T or F, you may have a Virus if your system mysteriously shuts itself down, or starts itself up. Pg 812
True
What two things a virus will try to accomplish? Pg 813
Render your system inoperable, and spread to other systems.
How are viruses spread today by email? Pg 813
The infected system attaches a file to any email that you send to another user. The recipient opens the file, and the virus infects the target system.
What is the best defense against a virus? Pg 814
Up to date antivirus software.
This virus protects itself with protective code that can stop debuggers or disassemblers from examining critical elements of the virus. Pg 814
Armored Virus
This virus attaches itself to legitimate programs, then creates a program with a different filename extension. Pg 815
Companion Virus
This virus alters programs and databases. The only way to remove this virus is to wipe the drive and reinstall . Pg 815.
Phage Virus