Chapter 18 - Working with Windows 8/8.1 Flashcards

1
Q

What is malware?

A

Any software designed to disrupt or damage a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is spyware?

A

Distributed without user intervention or knowledge, monitors activity on the network (*Keylogger is a type of spyware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

A software code that is deliberately created by an attacker. Viruses may collect sensitive information or may alter and destroy information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm?

A

A piece of code that uses the network to replicate itself. Worms consume bandwidth on the network *You would notice that your network is slowing down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a trogan?

A

A malicious software disguised as a legitimate program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Rootkit?

A

A malicious program that gains full access to a computer program. Often a direct attack on a system using a vulnerability or password *Gets down to the root/basic level of a computer *Runs processes in the background=rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Ransomware?

A

Software that blocks access to a computer system until a sum of money is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are types of phishing?

A

Vishing- attacker uses phone calls to get information Spearfishing,- attack focused on a specific group of people
Whaling- An attacker focusing on a high profile individual such as CEOs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Social Engineering?

A

Physically or verbally pretending to be someone else to gain access to information. *Done in person *Vishing is the verbal form of social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DOS?

A

Denial of Service- Sending enough requests to overload a resource or even stopping its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a DDOS?

A

Distributed DOS- An attack launched from many computers called zombies (is an infected computer) or botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Zombies/Botnets?

A

Services controlled remotely or automatically without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spoofing?

A

Uses a forged MAC or IP address to impersonate a trusted computer *Associated with MITM attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a MITM attack?

A

Man in the middle- Intercepting communication between computers to steal information transiting through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DNS poisoning?

A

Changing DNS records to impostor servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Zero-Day Virus/Attack?

A

A type of malware that is exclusive, resulting in panic and disarray to mitigate the issue.

17
Q

What is a Brute Force Attack?

A

A trial and error method used to gain access to certain data.

18
Q

What is a Dictionary Attack?

A

A type of brute force attack where dictionary words are used to generate a list of possible passwords.

19
Q

What is an RSA token?

A

Uses software on computer and uses a physical token

20
Q

What is SSO?

A

Single Sign-on- An access control method that allows for a single username and password to be used to access multiple accounts that use different usernames and passwords.

21
Q

What’s the difference between EFS and Bitlocker?

A

EFS encrypts files while Bitlocker encrypts your entire hard drive itself.

22
Q

What is a PII?

A

Personable Identifiable Information (PII)- Data that is hard to deny *Mother’s maiden name, address, etc
(PHI = Personal Health Information)