Chapter 9: Malware, Vulnerabilities and Threats Flashcards

1
Q

Spyware

A
  • Monitors user activity and reports it to another party

- Does not replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rootkits

A

Software programs that have the ability to hide certain things from the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command to display running processes in Linux

A

ps -ef | more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common file extensions that should not be allowed in your network

A
.bat
.com
.exe
.hlp
.pif
.scr
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logic Bombs

A

Programs or code snippets that execute when a certain predefined event occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

Malicious software running on a zombie and under the control of a bot-herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Software takes control of a system and demands that a third party be paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Ways a Virus can enter your computer

A

1) Contaminated media (DVD, USB, CD)
2) Email or social networking sites
3) As part of another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Retrovirus

A

Attak or bypass the antivirus software installed on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multipartite virus

A

Attacks your system in multiple ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Armored Virus

A

Difficult to detect or analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Companion Virus

A

Attaches itself to legitimate programs and then creates a program with a different filename extension.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phage

A

Modifies and alters other programs and databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Macro

A

Exploits the enhancements made to many application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SPIM and SPIT

A

Spam over instant messaging, and spam over Internet telephony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ping of Death

A

Crashes the system by sending ICMP packets that are larger than the system can handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pharming

A

Traffic intended for one host is sent to another, with the intent of pretty much phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spear Phishing

A

Form of phishing in which the message is made to look as if it came from someone you know and trust

19
Q

Vishing

A

Phishing over the phone

20
Q

Xmas Attack

A

An advanced scan that tries to get around firewall detection and look for open ports

21
Q

Replay Attack

A

The attacker captures information and replays it

22
Q

Smurf Attack

A

Spoofing the target machine’s IP address and broadcasting to that machine’s routers so that the routers think the target is sending out the broadcast. All machines try to respond and the target machine overloads

23
Q

How to stop a smurf attack?

A

Prohibit ICMP packets from passing through your router.

24
Q

Dictionary Attack

A

Uses a dictionary of common words to attempt to find a user’s password

25
Q

Birthday Attack

A

Tries to find another value to be hashed and give the same result.

26
Q

Client-Side Attack

A

One that targets vulnerabilities in client applications that interact with a malicious server.

27
Q

Typo Squatting and URL Hijacking

A

Registering domains that are similar to those for a known entity

28
Q

Watering Hole Attack

A

Identify a site visited by the target, poison that site, and wait for results.

29
Q

Cross-Site Scripting (XSS)

A

Using a client-side scripting language to trick a user who visits a site into having code execute locally

30
Q

Cross-Site Request Forgery (XSRF)

A

Unauthorized commands coming from a trusted user to the website, often without the user’s knowledge

31
Q

SQL Injection Attack

A

Entering SQL code into a field and submitting it so that it executes

32
Q

LDAP Injection Attack

A

Could allow access to directories and shit when it shouldn’t

33
Q

XML Injection Attack

A

Can return entire documents

34
Q

Directory Traversal Attack

A

An attacker is able to gain access to restricted directories through HTTP

35
Q

Command Injection Attack

A

Injecting commands to carry out a directory traversal attack

36
Q

Evercookie

A

A cookie that writes data to multiple locations, making it hard to remove completely

37
Q

Locally Stored Object/Flash Cookie

A

Data stored on a user’s computer by Adobe Flash

38
Q

Session Hijacking

A

When the item used to validate a user’s session, such as a cookie, is stolen and used by another to establish a session with the host

39
Q

Header Manipulation

A

Uses other methods to change values in HTTP headers and falsify access.
InPrivate Filtering helps prevent

40
Q

Arbitrary Code Execution

A

Allowing a program to remotely accept commands and execute them

41
Q

Banner Grabbing

A

Looks at the banner or header information messages sent with data to find out about systems

42
Q

Architectural Approach

A

Involves using a control framework to focus on the foundational infrastructure

43
Q

Design Review

A

Examines the ports and protocols used, the rules, segmentation and access control.