K05 - Host Security Enumeration Flashcards
What was the name of the first trojan program?
ANIMAL
What was the name of the first PC virus?
brain
What kind of software is designed to detect and destroy computer viruses?
antivirus
________ exploits are vulnerabilities within software or hardware not discovered, reported, and/or a fix has not been created yet.
zero day
How does antivirus software work?
scans
Determine whether the scanning method described is On-demand or Real-Time: scans are executed by the user.
on demand
Determine whether the scanning method described is On-demand or Real-Time: scans running in the background and constantly checking for viruses.
real time
A(n) ______________ is hardware or software designed to monitor system activities in real time to detect malicious activity and behaviors.
intrusion detection system
True/False: Splitting data in several packets over a network (Session Splicing) is a technique that can be used to evade an intrusion detection system.
true
What is a software application that is used to store and manage the passwords that a user has for various online accounts and security features?
- Master Key
- Security vault
- Password manager
- ShopK33per
password manager
The term ____________ is a broad term used to cover malicious softwares such as viruses, worms, and trojans.
malware
List the malware type that best fits the following description: a type of malware that often takes the form of a piece of code inserted in an application, program, or system and is deployed by victims themselves.
virus
List the malware type that best fits the following description: a type of malware that replicates itself, and can copy itself without any human interaction. It is not host-dependent.
worm
List the malware type that best fits the following description: a type of malware disguised as legitimate software, application, or file to deceive users into downloading it and granting control of their device(s).
trojan
List the malware type that best fits the following description: a type of malware that locks and encrypts a victim’s device or data and demands a ransom to restore access.
ransomware
List the malware type that best fits the following description: a type of malware that infiltrates devices without the owner’s knowledge; often for the purpose of spying on internet activity, tracking login and password information, or collecting sensitive information that can be used for fraudulent purposes.
spyware
True/False: DoS could be used to evade an IDS. Overloading the IDS with data could cause the IDS to reboot or miss entire sessions.
true
What is a software application that stores passwords in an encrypted format and provides secure access to all the password information with the help of a master password?
- hash key
- Cipher
- Master Key
- Password manager
password manager
True/False: Discovering and reporting a vulnerability allows organizations to develop a security remedy and implement it
true
True/False: It is ideal to employ as many antiviruses and software applications as possible since they utilize minimal resources and will not slow down host machines.
false
A(n) ______________ will be sent If a suspicious event is detected by an IDS.
- Alert
- Notification
- Verification code
alert
True/False: Behavioral systems are highly effective against zero-day exploits since they do not require previous executions of a malware to recognize the attack.
false
If malicious activity is found, an IPS will ____________ the unauthorized execution of the malicious processes.
- Log
- Flag
- Attempt to prevent
- Ignore
attempt to prevent
A(n) _________ is a host-based security application on a local system and attempts to stop malicious activity from happening.
- Sniffer
- HIPS
- NBIDS
- Firewall
HIPS