K05 - Host Security Enumeration Flashcards
What was the name of the first trojan program?
ANIMAL
What was the name of the first PC virus?
brain
What kind of software is designed to detect and destroy computer viruses?
antivirus
________ exploits are vulnerabilities within software or hardware not discovered, reported, and/or a fix has not been created yet.
zero day
How does antivirus software work?
scans
Determine whether the scanning method described is On-demand or Real-Time: scans are executed by the user.
on demand
Determine whether the scanning method described is On-demand or Real-Time: scans running in the background and constantly checking for viruses.
real time
A(n) ______________ is hardware or software designed to monitor system activities in real time to detect malicious activity and behaviors.
intrusion detection system
True/False: Splitting data in several packets over a network (Session Splicing) is a technique that can be used to evade an intrusion detection system.
true
What is a software application that is used to store and manage the passwords that a user has for various online accounts and security features?
- Master Key
- Security vault
- Password manager
- ShopK33per
password manager
The term ____________ is a broad term used to cover malicious softwares such as viruses, worms, and trojans.
malware
List the malware type that best fits the following description: a type of malware that often takes the form of a piece of code inserted in an application, program, or system and is deployed by victims themselves.
virus
List the malware type that best fits the following description: a type of malware that replicates itself, and can copy itself without any human interaction. It is not host-dependent.
worm
List the malware type that best fits the following description: a type of malware disguised as legitimate software, application, or file to deceive users into downloading it and granting control of their device(s).
trojan
List the malware type that best fits the following description: a type of malware that locks and encrypts a victim’s device or data and demands a ransom to restore access.
ransomware