Lecture 3 HW Flashcards

1
Q

What category of malware is known for its ability to spread autonomously across networks by exploiting vulnerabilities?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary function of a firewall in network security?

A

To monitor and analyze network traffic for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is IP Spoofing?

A

It’s an attack where the attacker changes the source IP address to impersonate a different computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In IP Spoofing, what does the attacker do?

A

Changes their own IP address to the spoofed address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack involves the interception and analysis of network traffic to capture sensitive data or gain unauthorized access to information?

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of malware spreads through infected files and relies on user interactions topropagate?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can organizations defend against sniffing attacks?

A

By implementing encryption protocols and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is session hijacking?

A

The process of taking over an existing active session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does session hijacking typically occur?

A

By manipulating session cookies or tokens, sniffing the session ID and then launching DoS attacks on the server machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What technology is used to establish an encrypted link between a server and a client forsecure Internet traffic?

A

SSL (Secure Sockets Layer) (i.e., TLS (Transport Layer Security))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of X.509 certificates in SSL?

A

To identify the server participating in the SSL connection (i.e., binding an identity to a public key using a digital signature).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a Smurf attack work?

A

It sends a flood of ICMP Echo Requests to a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a type of Denial of Service (DoS) attack that involves overwhelming a target system with a flood of TCP SYN packets?

A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of intrusion detection systems (IDS) in defending against SYN floodattacks?

A

To monitor the suspicious network activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a rootkit?

A

A type of malware that modifies the operating system’s kernel to hide its existence and provide unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do Trojans typically spread?

A

Through infected files, email attachments, or shared resources.

17
Q

Which type of malware disguises itself as legitimate software to deceive users into executing it?

A

Trojan

18
Q

What should be done to defend against worms effectively

A

Apply security patches to eliminate vulnerabilities.

19
Q

Which tool can be used to detect rootkits on a Windows operating system?

A

RootkitRevealer

20
Q

What is the purpose of application whitelisting in mitigating Trojan threats?

A

To allow only trusted applications to run