More Flashcards

0
Q

Viruses, Malware & Macro viruses are the…

A

Three types of Malicious Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A virus written in a macro language: that is to say, a language built into a software application such as word processor

A

Macro virus

*some applications (like parts of Microsoft Office) allow macro programs to be embedded in documents so that the program will run automatically when the document opens
^^^This provides a distinct mechanism by which viruses can be spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the System Security Threats?

A

Privilege escalation, Spyware, Adware, & Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software designed to hide the existence of certain processes or programs from normal methods of detection and enable continued access to a computer

A

Rootkits

*hides itself from the operating system. Written to circumvent antivirus that is out of date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A program that searches out other programs and infects them by embedding a copy of itself. When the infected program executes, the embedded virus is executed, which propagates the infection

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hosts that are directly reachable from untrusted networks

A

DMZ (Demilitarized Zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAT (Network address translation)

A

Internal addresses unreachable from external network
〰enables a local-area network (LAN) to use one set of ip addresses for internal traffic and a second set for external traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some purposes of NAT?

A
  1. Provides a firewall by hiding internal ip addresses
  2. Enables a company to use more internal ip addresses
  3. Let’s a company combine multiple ISDN connections into a single internet connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A list of each object (directory or file) and user access privileges such as read, write or execute

A

ACL (Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Administration assigning too much privileges or when software developers leave backdoors in the programs

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Monitors users activity, gathers information for marketing, or tries to get CC data

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used when referencing any type of program that downloads or displays unwanted banner ads in the software being used

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly