Domain 3: Threats and Vulnerablilities Flashcards
1
Q
OVAL
A
open vulnerability assessment language.
2
Q
IRC
A
internet relay chat (used by bots, zombies and control centers).
3
Q
SPIM
A
spam over instant messaging.
4
Q
XSS
A
cross-site scripting (cookie stealing).
5
Q
Viruses
A
simple, needs user interaction. single host.
6
Q
Worms
A
no user interaction. replicates fast.
7
Q
Trojan Horse
A
concealed as a “good” program.
8
Q
Backdoor
A
Illicit server process.
9
Q
Steganography
A
hiding program or message inside an image.
10
Q
Logic Bomb
A
waits for activity or date. inside job.
11
Q
Rootkit
A
hides malicious activity.
12
Q
Replay
A
successful logon captured by a protocol analyzer.
13
Q
Phishing
A
sent to millions, no targeting.
14
Q
Spear Phishing
A
targeting an individual.
15
Q
Whaling
A
high-value targets.