IS4560 T&D CHAPTER 7 Flashcards

1
Q

____ is - A device left behind on a system by an attacker with the purpose of allowing the attacker to reenter the system later. Also defined as an entry point on a system that an attacker uses to gain entry to a system. Backdoors typically provide a means of gaining entry into a system without having to go through normal security checks and systems.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is - The process of probing services, systems, and applications with the goal of discov- ering detailed information that can be used to attack a target system. Enumeration has the ability to reveal user accounts, passwords, group names, and other information about a target.

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ is - Software designed to capture the keystrokes of the user and then be retrieved by an attacker later on.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is - A feature present in Windows operating systems used to connect to a system remotely. The feature has the ability to reveal usernames and share information on a target system.

A

NULL session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is - The activity of obtaining a password by using methods designed to determine the password or capture the password.

A

Password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is - The process of increasing privileges above what one would otherwise possess with a user account. The process is performed by cracking the password of an existing account or by changing the password of an account that already has access.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is - A type of attack targeted toward passwords in which every combination of charac- ters is hashed and then compared a hashed password later.

A

Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ is - A piece of software placed on a system to do any number of tasks on behalf of an attacker. Rootkits have the ability to hand control of a system over to an attacker at a very fundamental level.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ is - The part of the Windows operating system that holds user account and associated passwords in a hashed format.

A

Security Account Manager (SAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is - A protocol used to manage network devices.

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ is - Software designed to track or observe the usage of a computer system. Refers to a class of software that is designed to hide and observe the actions of a victim. Software of this type can intercept information for purposes of identity theft, financial gain or other information.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is - A language used to interact with databases. Using SQL it is possible to access, manipulate and change data in databases to differing degrees.

A

Structured Query Language (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ is - A piece of software that infects a system and can perform any action such as corrupting data or system files to formatting drives.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly