IAS MT Flashcards

1
Q

It stands for “Malicious Software”

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

it is designed to gain
access or installed into the computer without the consent of the user.

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

They
perform unwanted tasks in the host computer for the benefit of a third party.

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

simply written to distract/annoy the user, to the complex ones which
captures the sensitive data from the host machine and send it to remote
servers.

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is a special type of malware which is used for forced advertising.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

They either redirect the page to some advertising page or pop-up an additional page which promotes some product or event.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are financially supported by
the organizations whose products are advertised.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There is some malicious software which are downloaded along with the free software offered over the internet and installed in the host computer without the
knowledge of the user.

A

Browser Hijacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This software modifies the browsers setting and redirect
links to other unintentional sites.

A

Browser Hijacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a special type malware of which is installed in the target computer with or without the user permission and is designed to steal sensitive information from the target machine.

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mostly it gathers the browsing habits of the user and the send it to the remote server without the knowledge of the owner of the computer. Most of the time they are downloaded in to the host computer while downloading freeware i.e. free application programs from the internet.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

may be of various types; It can keeps track of the cookies
of the host computer, it can act as a keyloggers to sniff the banking
passwords and sensitive information, etc.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a malicious code written to damage/harm the host computer by deleting or appending a file, occupy memory space of the computer by replicating the copy of the code, slow down the performance of the computer, format the host machine, etc. It can be spread via email attachment, pen drives, digital images, e-greeting, audio or video clips,
etc.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

may be present in a computer but it cannot activate itself
without the human intervention. Until and unless the executable file(.exe)
is execute, cannot be activated in the host machine.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

They are a class of virus which can replicate themselves.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

They are different from the virus by the fact that they does not require human intervention to travel over the network and spread from the infected machine to the whole network.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

can spread either through network, using the loopholes of the Operating System or via email. The replication and spreading of the this over the network consumes the network resources like space and bandwidth and force the network to chok

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is a malicious code that is installed in the host machine
by pretending to be useful software.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The user clicks on the link or download the file which pretends to be a useful file or software from legitimate source. It not only damages the host computer by manipulating the data but also it
creates a backdoor in the host computer so that it could be controlled by a remote computer.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a network of computers which are infected by malicious code and controlled by central controller.

A

Botnet(robot network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The computers of this network which are infected by malicious
code are known as

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

are networks of hijacked computer devices used to
carry out various scams and cyberattacks.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The term “botnet” is
formed from the word’s

A

Robot and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

serve as a tool to automate mass attacks, such as data theft,
server crashing, and malware distribution.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

It holds the host computer hostage until the
ransom is paid. The malicious code can neither be
uninstalled nor can the computer be used till the ransom is
paid.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When was the internet born?

A

Around 1960’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When was the the
trend changed from causing the physical damaging to computers to making a
computer malfunction using a malicious code

A

Around 1980’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This term is used to describe a unlawful activity in
which computer or computing devices such as smartphones, tablets,
Personal Digital Assistants(PDAs), etc. which are stand alone or a part
of a network are used as a tool or/and target of criminal activity.

A

Cyber Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

It is
often committed by the people of destructive and criminal mindset
either for revenge, greed or adventure.

A

Cyber Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An attack to the network or the computer system by some person with authorized system access is known as?

A

Insider attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

It is generally performed
by dissatisfied or unhappy inside employees or contractors.

A

Insider attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The
insider attack could be prevented by planning and installing an?

A

internal intrusion detection systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When the attacker is either hired by an insider or an external entity
to the organization

A

External attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

These attacks are generally performed by amateurs who don’t have
any predefined motives to perform the cyber attack. Usually these
amateurs try to test a tool readily available over the internet on the network
of a random company.

A

Unstructured attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

These types of attacks are performed by highly skilled and
experienced people and the motives of these attacks are clear in their
mind. They have access to sophisticated tools and technologies to gain
access to other networks without being noticed by their Intrusion Detection
Systems(IDSs).

A

Structure attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

these attacker have the necessary expertise to develop or
modify the existing tools to satisfy their purpose.

A

Structured attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

These types of attacks are
usually performed by professional criminals, by a country on other rival
countries, politicians to damage the image of the rival person or the country,
terrorists, rival companies, etc.

A

Structured attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In the hierarchical organizational structure, it is the head of the organization

A

Criminal boss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In the hierarchical organizational structure, they are the trojan provider and manager

A

Under boss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In the hierarchical organizational structure, they are the attackers crimeware toolkit owner

A

Campaign manager and stolen data reseller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

6 reasons for commission of cyber crimes

A

Money
Revenge
Fun
Recognition
Anonymity
Cyber Espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

One of the six reasons for commission of cyber crimes, It is considered to be pride if someone hack the highly secured
networks like defense sites or networks.

A

Recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

One of the six reasons for commission for cyber crime, At times the government itself is involved in cyber trespassing to
keep eye on other person/network/country. The reason could be politically, economically
socially motivated.

A

Cyber Espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

19 kinds of cyber crime

A

Cyber stalking
Child pornography
Forgery and counterfeiting
Software piracy and crime related to IPRs
Cyber Terrorism
Phishing
Computer vandalism
Computer hacking
Creating and distributing viruses over internet
Spamming
Cross site scripting
Online auction fraud
Cyber squatting
Logic bombs
Web jacking
Internet time thefts
Denial of service attack
Salami attack
Data diddling
Email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

It is a process of changing the header information of an e-mail so that its
original source is not identified and it appears to an individual at the receiving end that
the email has been originated from source other than the original source

A

Email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

It is a practice of changing the data before its entry into the computer system.
Often, the original data is retained after the execution on the data is done.

A

Data diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

It is an attack which proceeds with small increments and final add up to lead to
a major attack. The increments are so small that they remain unnoticed

A

Salami attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

It is a cyber attack in which the network is chocked and often collapsed by
flooding it with useless traffic and thus preventing the legitimate network traffic

A

Denial of service attack

49
Q

Hacking the username and password of ISP of an individual and surfing the
internet at his cost is?

A

Internet time Theft

50
Q

The hacker gain access to a website of an organization and either blocks it or
modify it to serve political, economical or social interest.

A

Web jacking

51
Q

These are malicious code inserted into legitimate software. The
malicious action is triggered by some specific condition. If the conditions holds
true in future, the malicious action begins and based on the action defined in
the malicious code, they either destroy the information stored in the system or
make system unusable.

A

Logic bombs

52
Q

It is an act of reserving the domain names of someone else‟s trademark
with intent to sell it afterwards to the organization who is the owner of the
trademark at a higher price.

A

Cyber Squatting

53
Q

There are many genuine websites who offers online auction over internet. Taking
the advantage of the reputation of these websites, some of the cyber criminals lure the
customers to online auction fraud schemes which often lead to either overpayment of
the product or the item is never delivered once the payment is made.

A

Online auction fraud

54
Q

It is an activity which involves injecting a malicious client side script into a trusted
website. As soon as the browser executes the malicious script, the malicious script gets
access to the cookies and other sensitive information and sent to remote servers. Now
this information can be used to gain financial benefit or physical access to a system for
personal interes

A

Cross site scripting

55
Q

Sending of unsolicited and commercial bulk message over the internet
is known as

A

Spamming

56
Q

3 criterias that an email cab be classified as spam

A

Mass mailing
Anonymity
Unsolicited

57
Q

One of the criteria in spamming, the email is not targeted to one particular person but to a
large number of peoples.

A

Mass mailing

58
Q

One of the criteria in spamming, The real identify of the person not known

A

Anonymity

59
Q

One of the criteria in spamming, the email is neither expected nor requested for the recipient.

A

Unsolicited

60
Q

The spreading of a virus can cause business and financial loss to an organization. The loss
includes the cost of repairing the system, cost associated with the loss of business during
downtime and cost of loss of opportunity. The organization can sue the hacker, if found, for
the sum of more than or equivalent to the loss borne by the organization.

A

Creating and distributing viruses over internet

61
Q

One of the classification of hackers,someone outside computer security consulting firms who is used to
bug-test a system prior to its launch, looking for exploits so they can be closed.

A

Blue Hat

62
Q

One of the classification of hackers, find out the security vulnerabilities and report to the site administrators
and offer the fix of the security bug for a consultancy fee.

A

Grey Hat

63
Q

One if the classification of hackers, They may
hack the system for social, political or economically motivated intentions. They find the security
loopholes the system, and keep the information themselves and exploit the system for
personal or organizational benefits till organization whose system is compromised is aware of
this, and apply security patches.

A

Black hat

64
Q

One of the classification of hackers and also known as the crackers

A

Black hat

65
Q

One of the classification of hackerd, are the persons who hack the system to find the security vulnerabilities
of a system and notify to the organizations so that a preventive action can be taken to protect
the system from outside hackers

A

White hat

66
Q

They are also known as ethical hackers

A

White hat

67
Q

It is a practice of modifying computer hardware and software to
accomplish a goal outside the creator‟s original purpose.

A

Computer hacking

68
Q

t is an act of physical destroying computing resources using physical
force or malicious code.

A

Computer vandalism

69
Q

It is a process of acquiring personal and sensitive information of an
individual via email by disguising as a trustworthy entity in an electronic
communication.

A

Phishing

70
Q

The purpose of this is identity theft and the personal
information like username, password, and credit card number etc. may be used
to steal money from user accoun

A

Phishing

71
Q

It is defined as the use of computer resources to intimidate or coerce
government, the civilian population or any segment thereof in furtherance of
political or social objectives.

A

Cyber Terrorism

72
Q

is an illegal reproduction and distribution for personal
use or business. It comes under crime related to IPR infringement. Some of the
other crimes under IPR infringement are: download of songs, downloading
movies, etc.

A

Software piracy snd Crime related to IPRS

73
Q

It is an act of possessing image or video of a minor (under 18),
engaged in sexual conduct.

A

Child pornography

74
Q

It is an act of stalking, harassing or threatening someone using
Internet/computer as a medium. This is often done to defame a person and
use email, social network, instant messenger, web-posting, etc. as a using
Internet as a medium as it offers anonymity. The behaviour includes false
accusations, threats, sexual exploitation to minors, monitoring, etc.

A

Cyber stalking

75
Q

With
the advancement in the hardware and the software, it is possible to produce
counterfeit which matches the original document

A

Forgery and counterfeiting

76
Q

It is a process of identifying an individual and ensuring that the individual is
the same who he/she claims to be

A

Authenthication

77
Q

A typical method for authentication over
internet is via?

A

username and password

78
Q

It is the name suggest it is a password
which can be used one time only and is sent to the user as an SMS or
an email at the mobile number/email address that they have specified
during the registration process

A

One time password

79
Q

It is known as two-factor authentication
method and requires two type of evidence to authentication an individual
to provide an extra layer of security for authentication.

A

One Time password

80
Q

The process of giving access to an individual to certain resources
based on the credentials of an individual is known as?

A

Authorization

81
Q

Now, one can
easily understand the role of strong password for authorization to ensure
cyber security as an easy password can be a cause of security flaw and
can bring the whole organization at high risk. Therefore, the password
policy of an organization should be such that employees are forced to use
strong passwords(more than 12 characters and combination of lowercase
and uppercase alphabets along with numbers and special characters) and
prompt user to change their password frequently

A

no answer just read

82
Q

is used which combines
both the username and password along with hardware security measures
like biometric system,

A

Hybrid Authentication

83
Q

the method to provide secure
access via hybrid security authentication to the company network over
internet.

A

VPN (virtual private network

84
Q

It is a technique to convert the data in unreadable form before transmitting
it over the internet

A

Encryption

85
Q

defined
as a technique to lock the data by converting it to complex codes using
mathematical algorithms.

A

Encryption

86
Q

The decoding of the
complex code to original text using key is known as

A

Decryption

87
Q

If the same
key is used to lock and unlock the data, it is known as

A

Symmetric Key Encryption

88
Q

it is a complex task because the security of key
while transmission is itself an issue

A

Key Distribution

89
Q

it is also known as public key encryption

A

asymmetric key encryption

90
Q

A type of key that is known to everyone.

A

Public Key

91
Q

A key is known to the particular user, who owns the key

A

Private Key

92
Q

It is a technique for validation of data.

A

Digital Signatures

93
Q

a process of
certifying the content of a document.

A

Validation

94
Q

it is not only
validate the data but also used for authentication.

A

Digital signatures

95
Q

it is
created by encrypting the data with the private key of the sender.

A

Digital signatures

96
Q

A special program used which is designed to protect the system against virus.

A

Antivirus

97
Q

It is a hardware/software which acts as a shield between an organization’s network and
the internet and protects it from the threats like virus, malware, hackers, etc.

A

Firewall

98
Q

It can be used to
limit the persons who can have access to your network and send information to you.

A

Firewall

99
Q

Two types of traffic in an organization

A

Inbound traffic and outbound traffic

100
Q

using this it is possible to configure and monitor the
traffic of the ports

A

Firewall

101
Q

example of this firewall are routers through which
the network is connected to the network outside the organization i.e. Internet.

A

Hardware Firewall

102
Q

These firewalls are installed and installed on the server
and client machines and it acts as a gateway to the organizations‟ network

A

Software FIrewall

103
Q

all the outbound traffic is routed through proxies for monitoring and
controlling the packet that are routed out of the organization

A

proxy

103
Q

based on the rules defined in the policies each packet is
filtered by their type, port information, and source & destination information. The
example of such characteristics is IP address, Domain names, port numbers,
protocols etc. Basic packet filtering can be performed by routers.

A

Packet Filtering

104
Q

rather than going through all the field of a packet, key
features are defined. The outgoing/incoming packets are judged based on
those defined characteristics only.

A

Stateful Inspection

105
Q

it is an essential component of the organizations‟ network

A

Firewall

106
Q

They not only protect the organization against the virus and other malicious
code but also prevent the hackers to use your network infrastructure to launch
DOS attacks.

A

Firewall

107
Q

Only the sender and the receiver know about the existence of the secret message in the
image. The advantage of this technique is that these files are not easily suspected.

A

STeganography

107
Q

it acts as a
fundamental system in case of a mishap where data is inadvertently lost or corrupted
from original system

A

Backup System

107
Q

It is a technique of hiding secret messages in a document file, image file, and program or
protocol etc. such that the embedded message is invisible and can be retrieved using special
software.

A

Steganography

108
Q

where data is backed up on a full-scale and recovered back from the
same

A

full back up

108
Q

where only changed or newly added data is backed up
subsequently after the last full or incremental backup.

A

Incremental Backup

109
Q

where only changed or newly added data is backed up
subsequently after last full or differential backup but changes made in the previous
differential backup are updated in next differential backup

A

differential back up

110
Q

Methods in an enterprise can be improved based ono performance metrics, is measured in terms of cost for infrastructure,
operations and maintenance.

A

Total Cost of ownership

111
Q

AOB stands for?

A

Age of Backup

112
Q

RTO stands for?

A

Recovery time objective

113
Q

RPO stands for?

A

Recovery Point Objective

114
Q
A