Information Assurance 3 Flashcards

1
Q

the term used to describe a program written to take advantage of a known vulnerability

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the act of using an exploit against a vulnerability

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data is written beyond the limits of a buffer

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Force programs to behave in an unintended way

A

Non-validated Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Improperly ordered or timed events

A

Race Conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protect sensitive data through authentication,
authorization, and encryption

A

Weaknesses in Security Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Access control to physical equipment and resources
  • Security practice
A

Access control to problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symptoms of Malware

A
  1. Increase in CPU usage
  2. Decrease in computer speed
  3. Computer freeze and crashes
  4. Decrease in Web browsing speed
  5. Unexplainable problems with network connections
  6. Files are modified
  7. Files are deleted
  8. Presence of unknown files, programs, or desktop icons
  9. Unknown processes running
  10. Programs are turning off or reconfiguring themselves
  11. Email is being sent without the user’s knowledge or consent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is used to steal data, bypass access control, cause harm to, or compromise a system.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Infection Methods

A
  1. virus
  2. worm
  3. trojan
  4. bot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

have the ability to replicate themselves by hooking them to the program on the host computer like songs, videos etc and then they travel all over the internet.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • their purpose is to conceal themselves inside the software that seems legitimate. Steals information or any other purpose.
  • Provide backdoor gateway for malicious programs
A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • advanced form of worms
  • Automated processes that are designed to interact over the internet without the need of human interaction
A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Self-replicating in nature but they don’t hook themselves to the program on the host computer.
  • Can easily travel from one computer to another.
A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

malware actions

A
  1. adware
  2. spyware
  3. ransomware
  4. scareware
  5. rootkit
  6. zombies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

display ads computer desktop or inside individual programs

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

software that monitors your activities on computer and reveal collected information to interested party.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It masquerades as a tool to help fix your system but when the software is executed it will infect your system or completely destroy it. The software will display a message to frighten you and force to take some action like pay them to fix your system.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is type of malware that will either encrypt your files or will lock your computer making it inaccessible either partially or wholly. Then a screen will be displayed asking for money i.e., ransom

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Designed to gain root access or we can say administrative privileges in the user system. Once gained the root access, the exploiter can do anything from stealing private files to private data.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

They work similar to Spyware. Infection mechanism is same but they don’t spy and steal information rather they wait for the command from hackers.

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Old Generation Attacks

A
  1. Theft of intellectual property
  2. Identity theft
  3. Theft of equipment and information
  4. Sabotage
  5. Information Extortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

means violation of intellectual property rights like copyrights, patents

A

Theft of intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

```

means to act someone else to obtain person9s personal information or to access vital
information they have like accessing the computer or social media account of a person by login into the account by using their login credentials.

A

Identity theft

24
Q

increasing these days due to the mobile nature o fdevices and increasing information capacity

A

Theft of equipment and information

25
Q

means destroying company9s website to cause loss of confidence on part of its
customer

A

Sabotage

26
Q

means theft of company9s property or information to receive payment in
exchange

A

Information extortion

27
Q

New Generation Attacks

A
  1. Technology with weak security
  2. Social media attacks
  3. Mobile Malware
  4. Outdated Security Software
  5. Corporate data on personal devices
  6. Social Engineering
28
Q

With the advancement in technology, with every passing day a new gadget is being released in the market. But very few are fully secured and follows Information security principles

A

Technology with weak security

29
Q

cyber-criminal identify and infect a cluster of websites that persons of a particular organisation visit, to steal information

A

Social media attacks

29
Q

With new threats emerging every day, updating in security software is a pre requisite to have a fully secured environment.

A

Outdated Security Software

30
Q
  • There is a saying when there is a connectivity to Internet there will be danger to Security.
  • Same goes to Mobile phones where gaming applications are designed to lure customer to download the game and unintentionally, they will install malware or virus in the device.
A

Mobile Malware

31
Q

These days every organization follows a rule BYOD. BYOD means Bring your own device like Laptops, Tablets to the workplace.

A

Corporate data on personal devices

32
Q
  • manipulating people so that they give up their confidential information like bank account details, password etc.
  • These criminals can trick you into giving your private and confidential information or they will gain your trust to get access to your computer to install a malicious software- that will give them control of your computer
A

Social Engineering

33
Q

Social Engineering (Methods of Infiltration)

A
  1. pretexting
  2. tailgating
  3. something for something (quid pro quo)
  4. baiting
  5. vishing
  6. phishing
  7. dumpster diving
34
Q

an attacker calls an individual and lies to them in an attempt to gain access to privileged data.

A

Pretexting

35
Q

an attacker quickly follows an authorized person into a secure location.

A

Tailgating

36
Q

an attacker requests personal information from a party in exchange for something

A

Something for something (Quid pro quo)

37
Q

The cyber criminal usually promises the victim a reward in return for sensitive information or knowledge of its whereabouts.

A

Baiting

38
Q

is a cyberattack where the attacker gets their hands on sensitive documents or data you carelessly threw into the trash bin.

A

Dumpster diving

38
Q

sent thru voicemails to convince victims they must act quickly to protect themselves from arrest or another risk.

A

Vishing

39
Q

Wi-Fi Password Cracking (Methods of Infiltration)

A
  1. Social engineering
  2. Brute-force attacks
  3. Network sniffing
40
Q

The attacker manipulates a person who knows the password into providing it.

A

Social Engineering

41
Q

The password maybe discovered by listening and capturing packets sent on the network.

A

Network Sniffing

42
Q

The attack tries several possible passwords in an attempt to guess the password.

A

Brute-force attacks

43
Q

Is a disruption of network services, this attack is a malicious attempt by a single person or a group of people to cause the victim, site or node to deny service to its customers.

A

Denial-of-Service (DoS)

43
Q

when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.

A

Phishing

44
Q

a network, host, or application is sent an enormous quantity of data at a rate which it cannot handle.

A

Overwhelming quantity of traffic

45
Q

when multiple hosts attack
simultaneously

A

(Distributed Denial of Service) -

46
Q

maliciously formatted packet is sent to a host or application and the receiver is unable to handle it.

A

Malicious formatted packets

47
Q

types of DOS attacks

A
  1. Penetration
  2. Eavesdropping
  3. Man-In-The-Middle
  4. Flooding
48
Q
  • attacker gains access to same network
  • listens to traffic going in and out
A

eavesdropping

48
Q
  • attacker gets inside your machine
  • take over machine and do whatever he wants
  • achieves entry via software, stolen password
A

penetration

49
Q
A
49
Q
  • attacker listens in input/output
  • can substitute messages in both directions
A

man-in-the-middle

49
Q
A
50
Q
  • attacker sends overwhelming number of messages; great congestion
A

flooding

51
Q

is a technique used by threat actors to increase the prominence of their malicious websites, making them look more authentic to consumers.

A

SEO Poisoning (SEO - Search Engine Optimization)

52
Q
  • Uses multiple techniques to compromise a target.
  • Uses a hybrid of worms, Trojan horses, spyware…
A

Blended Attack