Chapter 9 - Malware, Vulnerabilities, & Threats Flashcards
How is spyware different from other malware?
9 - 300
because it works on behalf of a third party
What is a rootkit?
9 - 301
software program that has the ability to hide certain things from the operating system
what is a trojan horse?
9 - 305
programs that enter a system or network under the guise of another program
what file extension belongs in both columns of allowed and not allowed for email attachments?
9 - 307
what is a logic bomb?
9 - 307
programs or code snippets that execute when a certain predefined event occurs
what is a backdoor attack?
9 - 308
2 different meanings
- troubleshooting and developer hooks into systems that often circumvented normal authentication
- gaining access to a network and inserting a program or utility that creates an entrance for an attacker
what is a botnet?
9 - 309
software running on infected computers called zombies, under the control of a bot herder
what is ransomware?
9 - 309
software delivered through a trojean takes control of a system and demands that a third party be paid
tell me the 8 kinds of viruses
9 - 310
polymorphic - change form to avoid detection
stealth - masking themselves from applications
retrovirus - attack or bypass the antivirus software database
multipartite - attack system in multiple ways
armored - difficult to detect or analyze
companion - also known as a trojan, attach to program and create program with a different filename extension
phage - modify and alter programs or databases
macro - exploits the enhancements made to application programs
what does it mean to use the “layered approach” with antivirus software?
9 - 317
it means you put the antivirus software at the gateways, the servers, and at the dekstop
two of the most common types of DoS attacks are what?
9 - 319
ping of death - send ICMP packets that are larger than the system can handle
buffer overflow - put more data into the buffer than it can hold
DDoS uses one computer to target multiple or multiple computers to target one ?
9 - 321
multiple computers to target one computer
what is spear phishing?
9 - 323
unique form of phishing in which the message is made to look as if it came from someone you know
is a man in the middle attack an active or passive attack?
what’s another name for this kind of attack?
9 - 324
active
TCP/IP hijacking
what is a smurf attack?
9 - 326
spoofing the target machine’s IP address and broadcasting to that machine’s routers so that the routers think the target is sending out the broadcast. target system becomes overloaded.