Miscellaneous Flashcards

1
Q

Smart card

A

card with chip on it to verify yourself, like credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motherboard

A

connects all parts of a computer together, most importantly the CPU and memory (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BIOS

A

firmware (permanently stored software on the motherboard). First program run when computer started, even before OS. After it´s done, it looks for a boot device (an OS), Checks that all hardware is there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Power on self test by BIOS

A

checks if hardware works correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operating system

A

Windows, Linux … let´s you interact with computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dynamic link library -DLL

A

Contain shared code that multiple programs use (like shared boks in libs). / can use at the same time. P.e. code for windows pop-ups, you can have several at one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kernel

A

computer program at the core of a computer’s operating system and generally has complete control over everything in the system. It is the portion of the operating system code that is always resident in memory, and facilitates interactions between hardware and software components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Driver

A

responsible for interaction between hardware and operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Remote access trojan

A

malware designed to allow an attacker to remotely control an infected computer. Once the RAT is running on a compromised system, the attacker can send commands to it and receive data back in response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Signature

A

a signature is a typical footprint or pattern associated with a malicious attack on a computer network or system. This pattern can be a series of bytes in the file (byte sequence) in network traffic. It can also take the form of unauthorized software execution, unauthorized network access, unauthorized directory access, or anomalies in the use of network privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Signature based detection

A

process where a unique identifier is established about a known threat so that the threat can be identified in the future. In the case of a virus scanner, it may be a unique pattern of code that attaches to a file, or it may be as simple as the hash of a known bad file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Payload

A

is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the context of a computer virus or worm, the payload is the portion of the malware which performs malicious action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lightweight programming

A

Lightweight programming languages are designed to have small memory footprint, are easy to implement (important when porting a language to different systems), and/or have minimalist syntax and features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Living off the land

A

refers to attacker behavior that uses tools or features that already exist in the target environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network perimeter

A

is the boundary between an organization’s secured internal network and the Internet — or any other uncontrolled external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flash BIOS

A

is a term used to describe the process of updating a computer’s motherboard. It is usually done to increase compatibility or increase the performance capabilities of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Logmonitoring

A

Almost all systems and software generate detailed logs: IDS, internet browsers, anti-malware software, routers, operating systems, firewalls, servers etc. As a result, a massive amount of log files is created every single day. These logs contain very crucial information in regard to the wellbeing and efficiency of your business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Drive

A

A drive is a location (medium) that is capable of storing and reading information that is not easily removed, like a disk or disc. All drives store files and programs used by your computer. For example, when you write a letter in a word processor, the program is loaded from the hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BitLocker

A

Microsoft BitLocker is a Windows native security feature that will encrypt everything on the drive that Windows is installed upon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Endpoint security

A

the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Runtime

A

Runtime is the period of time when a program is running. It begins when a program is opened (or executed) and ends with the program is quit or closed.

22
Q

Tampering

A

An intentional but unauthorized act resulting in the modification of a system, components of systems, its intended behavior, or data

23
Q

Central Processing Unit - CPU

A

“brain of computer”, processes data, executes instructions of program,

24
Q

Container

A

A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another.

25
Q

Data bus

A

A data bus is a system within a computer or device, consisting of a connector or set of wires, that provides transportation for data. The first standard for data bus was 32-bit, whereas newer 64-bit systems can handle much greater amounts of data.
A data bus can transfer data to and from the memory of a computer, or into or out of the central processing unit (CPU)

26
Q

Buffer

A

fixed length block of memory

27
Q

Software development toolkit (SDK)

A

set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms. These providers make their SDKs available to help developers easily integrate their apps with their services.

28
Q

Stack

A

A stack (sometimes called a “push-down stack”) is an ordered collection of items where the addition of new items and the removal of existing items always takes place at the same end. items stored in the stack that are closer to the base represent those that have been in the stack the longest. The most recently added item is the one that is in position to be removed first.

29
Q

Return address

A

this is the point the program should go back to when it is done with the call

30
Q

NOP’s (No operation Commands)

A

tell a processor to move (or slide across the NOPs) to the next instruction

31
Q

XML

A

XML (Extensible Markup Language) is a markup language similar to HTML, but without predefined tags to use. Instead, you define your own tags designed specifically for your needs. This is a powerful way to store data in a format that can be stored, searched, and shared

32
Q

Address

A

Location in memory to store data

33
Q

overflow

A

when result of addition is too large to be represented by the bits you have

34
Q

Secure Sockets Layer - SSL

A

standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems

35
Q

Spoofing

A

diverse methods available to control and operate the fundamental address system in different computer networks

36
Q

VLAN tagged/untagged

A

VLAN-enabled ports are generally categorized in one of two ways, tagged (also called trunked) or untagged. A VLAN is segmented (A VLAN purpose is to allow end point devices to be segregated from each other even though they might be connected on the same physical switch). Then, the purpose of a tagged port is to pass traffic for multiple VLAN’s, whereas an untagged port accepts traffic for only a single VLAN

37
Q

Network internet card - NIC

A

connects computer with network using ethernet cable, converts serial to parallel data, each NIC has unique identifier called MAC address

38
Q

RAM

A

stored on motherboard. Program wants to run, therefore needs to be loaded from hardware, where it is stored, into RAM. Then CPU can access it from there.

39
Q

Buffered RAM (there is also unbuffered RAM)

A

stores data before it gets to CPU (adds reliability)

40
Q

Secondary vs primary memory

A

secondary stored on hard drive, primary like RAM

41
Q

Hub

A

not intelligent so doesn´t know where to send data. Data arrives, then gets copied to all ports, so all devices connected with hub get data

42
Q

Switch

A

like hub but is intelligent, it sends it only to the destinated ports, so eliminates unnecessary traffic

43
Q

Router

A

forwards data from one network to other based on IP address. Like gateway for network

44
Q

Transmission Control Protocol - TCP

A

3 way handshake. Send message to computer, send back, send another to receiver. Then data is delivered. Guarantees delivery. If sth gets lost it will be re-send

45
Q

User Datagram Protocol - UDP

A

sends data but doesn´t check if it is received. Faster than TCP

46
Q

Domain name system - DNS

A

each website has an ip addredd- DNS is like a database, if you type in yahoo, DNS checks which ip address it has and connects it to you

47
Q

File Transfer Protocol

A

to upload and download files between internet users

48
Q

HTTP: Hypertext transfer protocol

A

To retrieve data from websites

49
Q

Secure Shell (SSH)

A

transfers sensitive data. Places shell around data

50
Q

Port

A

for logical connections, p.e. port 80 is HTTP