K05 - Host Security Enumeration Flashcards

1
Q

What was the name of the first trojan program?

A

ANIMAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the name of the first PC virus?

A

brain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of software is designed to detect and destroy computer viruses?

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ exploits are vulnerabilities within software or hardware not discovered, reported, and/or a fix has not been created yet.

A

zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does antivirus software work?

A

scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Determine whether the scanning method described is On-demand or Real-Time: scans are executed by the user.

A

on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine whether the scanning method described is On-demand or Real-Time: scans running in the background and constantly checking for viruses.

A

real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A(n) ______________ is hardware or software designed to monitor system activities in real time to detect malicious activity and behaviors.

A

intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True/False: Splitting data in several packets over a network (Session Splicing) is a technique that can be used to evade an intrusion detection system.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a software application that is used to store and manage the passwords that a user has for various online accounts and security features?

  • Master Key
  • Security vault
  • Password manager
  • ShopK33per
A

password manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The term ____________ is a broad term used to cover malicious softwares such as viruses, worms, and trojans.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the malware type that best fits the following description: a type of malware that often takes the form of a piece of code inserted in an application, program, or system and is deployed by victims themselves.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the malware type that best fits the following description: a type of malware that replicates itself, and can copy itself without any human interaction. It is not host-dependent.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List the malware type that best fits the following description: a type of malware disguised as legitimate software, application, or file to deceive users into downloading it and granting control of their device(s).

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List the malware type that best fits the following description: a type of malware that locks and encrypts a victim’s device or data and demands a ransom to restore access.

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the malware type that best fits the following description: a type of malware that infiltrates devices without the owner’s knowledge; often for the purpose of spying on internet activity, tracking login and password information, or collecting sensitive information that can be used for fraudulent purposes.

A

spyware

17
Q

True/False: DoS could be used to evade an IDS. Overloading the IDS with data could cause the IDS to reboot or miss entire sessions.

A

true

18
Q

What is a software application that stores passwords in an encrypted format and provides secure access to all the password information with the help of a master password?

  • hash key
  • Cipher
  • Master Key
  • Password manager
A

password manager

19
Q

True/False: Discovering and reporting a vulnerability allows organizations to develop a security remedy and implement it

A

true

20
Q

True/False: It is ideal to employ as many antiviruses and software applications as possible since they utilize minimal resources and will not slow down host machines.

A

false

21
Q

A(n) ______________ will be sent If a suspicious event is detected by an IDS.

  • Alert
  • Notification
  • Email
  • Verification code
A

alert

22
Q

True/False: Behavioral systems are highly effective against zero-day exploits since they do not require previous executions of a malware to recognize the attack.

A

false

23
Q

If malicious activity is found, an IPS will ____________ the unauthorized execution of the malicious processes.

  • Log
  • Flag
  • Attempt to prevent
  • Ignore
A

attempt to prevent

24
Q

A(n) _________ is a host-based security application on a local system and attempts to stop malicious activity from happening.

  • Sniffer
  • HIPS
  • NBIDS
  • Firewall
A

HIPS

25
Q

A host-based intrusion prevention system monitors the local operating system and applications for any malicious execution _____________.

  • Behavior
  • Signatures
  • All of the above
  • None of the above
A

All of the above

26
Q

A system that passively monitors a local computer’s ingress and egress communications and applications to detect signatures is known as what?

  • HIDS
  • Firewall
  • IPS
  • Wireshark
A

HIDS

27
Q

List the network-based security component that matches the following description: A system that passively monitors the network and alerts on suspicious behavior or signatures.

A

NIDS

28
Q

List the network-based security component that matches the following description: Monitors the network for any malicious activity. If a malicious activity is found, it will prevent unauthorized execution.

A

NIPS

29
Q

List the network-based security component that matches the following description: Hardware or software barrier between the internal network from the external network. Administrators are able to configure rules that allow or deny specific traffic.

A

firewall

30
Q

List the network-based security component that matches the following description: A remote and secure connection to a network. Is achieved by using encryption over a public network, typically the internet.

A

virtual private network

31
Q

True/False Both HIPS and HIDS are used to actively block the access to files detected as malicious.

A

false