Chapter 9 Malware, Vulnerabilities and Threats Flashcards

1
Q

Software exploitation

pg.299

A

attacks launched against applications and higher level services. They include gaining access to data using weakness int he data access objects of a database or a flaw in a service or appliations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spyware

pg.299

A

differs from other malware in that it works-often actively- on behalf of a third party. Monitors the users activity and reports it to another party without informing the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

pg.301

A

primary purpose of the malware application is to deliver ads, then it is classified as adware, can have the same qualities as a spyware, but primary purpose is to display ads and generate revenue for the creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rootkits

pg.301

A

software programs that have the ability to hide things for certain operating system. rootkit is able to do this by manipulating functions calls to the operating system and filtering out information that would normally appear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan Horses

pg.304

A

Programs that enter a system or network under the guise of another program. may included as an attachment or as a part of an installation, could create a backdoor or replace a valid program during installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logic Bombs

pg.307

A

programs or code snippets that execute when a certain predefined event occurs. A bomb may send a note to an attacker when a user is logged on to the Internet and is using a word processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backdoors

pg.308

A

Two different meaning. Original term refers to troubleshooting and developer hooks into systems that often circumvented normal authentication. Second type of backdoor refers to gaining access to a network and inserting a program or utility that creates an entrance for attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Botnets

pg.309

A

Software running on infected computers called zombies.Runs automatically and automomously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomeware

pg.309

A

Takes control of a system and demands that a third party be paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

pg.310

A

a piece of software designed to infect a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Polymorphic

pg.310

A

these viruses change form in order to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stealth

pg.310

A

these viruses attack attempt to avoid detection by masking themselves form applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Retroviruses

pg.310

A

Viruses attack or bypass the antivirus software installed on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multipartite

pg.310

A

Viruses attack your system in multiple ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Armored

pg.310

A

Type of virus is one that is designed to make itself difficult to detect or analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Companion

pg.310

A

Virus attaches itself to legitimate programs and then creates a program with a different file name extension

17
Q

Phage

pg.310

A

Virus is one that modifies and alters other programs and databases

18
Q

Macro

pg.310

A

type of virus exploits the enhancements made to many application programs which are used by programmers to expand the capability of appliations

19
Q

Armored Virus

pg.310

A

virus designed to make itself difficult to detect or analyze. Armored viruses cover themselves with protective code that stops debuggers or dis assemblers from examining elements of the virus

20
Q

Antivirus Software

pg.317

A

The primary method of preventing the propagation of malicious code . An application that is installed on a system to protect it and to scan for viruses as well as worms and trojan horses

21
Q

Spam

pg.316

A

Unwanted, unsolicited email

22
Q

DoS attacks

pg.319

A

Denial of service attacks prevents access to resources by users authorizes to use those resources

23
Q

DDos

pg.320

A

distributed denial of service is similar to DoS, amplifies the concepts of DoS by using multiple computer systems to conduct the attack against a single organization

24
Q

Spoofing attack

pg.321

A

an attempt by someone or something to masquerade as someone else, considered an access attack.

25
Q

ARP spoofing

pg.321

A

The MAC address Media Access Control, the data is faked

26
Q

DNS spoofing

pg.321

A

the DNS server is given information about a name server that it thinks is legitimate when it isnt

27
Q

Pharming Attack

pg.322

A

Pharming is a form of redirection in which traffic intended for one host is sent to another

28
Q

Phishing

pg.322

A

Phishing is a form of social engineering in which you ask someone for a piece of info that you are missing bu making it look like a legitimate question

29
Q

Spear phishing

pg.323

A

A unique form of phishing in which a message is made to look as if it came from someone you know and trust as opposed to an informal third party

30
Q

NMAP

pg.324

A

Known as the XMAS attack, an advance scan that tries to get to get around the firewall detection and look of open ports. Which can run on all operating systems.

31
Q

Man in the middle atack

pg.324

A

clandestinely places something in between sever and the user abut which neither the servers admin nor the user is aware