Primers Flashcards

1
Q

SANS Institute

A

SysAdmin, Audit, Networking, and Security (SANS) Institute is a nonprofit organization established in 1989 to provide valuable information and training to information security professionals. This institute also provides accreditation to organizations. SANS publishes a weekly news digest and original white papers on various topics in Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Emergency Response Team (CERT)

A

After the Morris worm incident, the U.S. government recognized the need for a public
or private entity to deal with incident coordination, response, and remediation efforts
during Internet security situations. The U.S. government contracted Carnegie Mellon
University to create a Computer Emergency Response Team (CERT) in 1988. The
team’s objective was to ensure that appropriate technology and systemsmanagement
practices resisted attacks on networked systems, limited damage, and
ensured continuity of critical services in spite of successful attacks, accidents, or
failures. The team also provided information on industry trends and educated
individuals and partners on security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

International Information Systems Security Certification Consortium, Inc. (ISC)2

A

established in 1989 as a nonprofit corporation to educate and to certify information
security professionals. Certifications offered included the Certified Information
Systems Security Professional (CISSP) certification. In 1990, (ISC)2 created the first
prototype for the Common Body of Knowledge (CBK) criteria. CBK defines global
industry standards and serves as a common framework of terms and principles
within the information security industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

National Cyber Security Division (NCSD)

A

a division of the Office of
Cyber Security & Communications. It is within the U.S. Department of
Homeland Security and is one of the U.S.’s main government organizations
responsible for improving the country’s defense against Internet-based attacks.
NCSD combined the Critical Infrastructure Assurance Office, the National
Infrastructure Protection Center, the Federal Computer Incident Response Center,
and the National Communications System into one organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

recommendations of the DHS Quadrennial Homeland Security

Review report

A
  • Appoint a cybersecurity policy official responsible for coordinating the nation’s
    cybersecurity policies and activities.
  • Prepare a cybersecurity incident response plan and enhance public-private
    partnerships.
  • Build a cybersecurity-based identity management vision and strategy that
    addresses privacy and civil liberties interests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Thomas Merrill and Larry Roberts

A

launched the Internet by developing the first
WAN in 1965, which eventually led to the development of IP in 1978 and
ultimately to the growth of the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Netscape Navigator

A

was the first commercial Web browser and was launched in

1993.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Morris Worm

A

Cyber attacks began with the Morris

Worm in 1988.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CERT, NIST, and NCSD.

A

With the growth of the threat to information in cyberspace and network systems,
the U.S. government appointed certain agencies to set standards and spread
awareness on the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

U.S. Cyberspace Policy review

A

started 2009 compiled ten critical

recommendations to improve the cybersecurity policy and implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2009 Cyberspace Policy Review

A

lists ten near-term action item initiatives

that should be undertaken to improve the United States’ cyber posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARPANET

A

Advanced Research Projects Agency Network (ARPANET) was a project
developed by MIT for the Department of Defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTCIA

A

The High Technology Crime Investigation Association (HTCIA), a
professional organization that is devoted to digital forensics for investigation
of crimes was set up in 1999.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NCP

A

Network Control Protocol (NCP) is a host-to-host protocol developed by
ARPANET.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST

A

The National Institute of Standards and Technology (NIST) is a government
body that ensures best possible practices are being followed during system
implementations for publicly accessible infrastructures such as electric
grids, dams, and even financial institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Image

A

Collection of individual dots called pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Analog

A

Representation of data in a continuous flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Audio

A

Digitization of signals by using sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Digital

A

Representation of data in its discrete form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Video

A

Series of digital images displayed rapidly at a constant rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ASCII

A

The American Standard Code for Information Interchange (ASCII) is
a standard for encoding data. This standard facilitates the transfer of
data from one type of computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AVI File Format

A

AVI is a multimedia format introduced by Microsoft and supports
audio and video data as well as audio and video streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Binary Number System

A

The binary, or base-2, system represents numbers using only two
digits: 0 and 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Decimal Number System

A

The decimal, or base-10, number system uses digits 0 to 9 to

represent a value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

EBCDIC

A

Extended Binary Coded Decimal Interchange Code (EBCDIC) is an
encoding method used on IBM computers. This technique uses 8-bit
character encoding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

FLV File Format

A

The FLV or Flash Video format is popularly used for delivering
Adobe Flash-based video files over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

GIF File Format

A

The .GIF file format is a type of bitmap image format which supports
8 bits per pixel. .GIF images are compressed using a lossless data
compression technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hexadecimal Number System

A

The hexadecimal, or base-16, number system uses16 symbols—the
numbers 0 to 9 and capital letters A to F.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

JPG File Format

A

The .JPG file format indicates an image file that has been

compressed using JPEG compression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

MP3 File Format

A

The .MP3 file format is a patented digital audio encoding format.
.MP3 files support audio data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

MP4 File Format

A

MP4 is a multimedia format standard and is popular for storing
digital audio and video files, subtitles, and still images. MP4 files are
capable of streaming over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Octal Number System

A

The octal, or base-8, number system uses digits 0 to 7 to represent
a value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

OGG File Format

A

OGG was created to meet the need for streaming and manipulating
high quality digital multimedia. It can concurrently support data as
diverse as audio, video, text, and metadata.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

OGM File Format

A

OGM was created as an extension of the OGG format, which does
not support video files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

PNG File Format

A

The .PNG file format is a type of bitmap image format that uses a
lossless data compression technique. .PNG is used for images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

RAM

A

Random Access Memory (RAM) is the primary piece of volatile
memory in computer system. The RAM stores temporary data,
which is over written frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

TIF File Format

A

The .TIF file format for storing images is popular among Apple
Macintosh users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Unicode

A

Unicode is an encoding scheme that covers characters from the
written languages used by most countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

WAV File Format

A

The .WAV file format is the standard file format that is used for the
system sounds in computers. The .WAV format is popular because it
facilitates the free exchange of audio files across various operating
systems for processing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

WMA File Format

A

Windows Media Audio (WMA) files can be compressed based on
factors like connection speed and bandwidth. The compression of
these files is higher as compared to the .MP3 files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

C:\Documents and Settings or
C:\Users

A

Stores the user’s application settings,

temporary files, and caches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

C:\Program Files

A

Is a repository of the programs installed

on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

C:\Recycling Bin or C:\Recycler

A
Contains the files deleted through the
GUI. Technically, files are not deleted;
they are moved to this directory. Once
deleted from here, they are permanently
deleted from the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

C:\System Volume Information

A

Hosts the system restore information,
which Windows uses as a backup of the
necessary configuration files used on the
last good start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

C:\Windows

A

Contains miscellaneous operating

system and application files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

C:\Windows\System32

A

Contains core operating system files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

C:\Windows\System32\Boot

A

Contains files necessary for the

operating system to boot up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

C:\Windows\System32\Catroot or
C:\Windows\System32\Boot\Catroot2

A

Contains catalog files and signature files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

C:\Windows\System32\Config

A

Hosts the registry hives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

C:\Windows\System32\drivers

A

Contains installed drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

C:\Windows\ I386

A
Contains files used for installing,
repairing, updating, and rebuilding
Windows. SMSS.EXE and NTDLL.DLL
are the two files responsible for
implementing the NT framework.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

bcdedit.exe

A

In Vista and Windows 7, boot information is stored in a file

called the Boot Configuration Data (BCD) store.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

boot.ini

A

In Windows versions pre-Vista, this file specifies operating
system selection defaults, operating system locations, and
operating system prioritization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

bootsect.dos

A

It is a file located in the system partition that allows the option
to boot into another operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

ntdetect.com

A

It is a hardware detection program that is located on the root of
the system partition. Ntdetect.com is invoked by the NT loader
(NTLDR) and returns the information it gathers to NTLDR when
finished, so that it can then be passed on to the Windows
kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

NTLDR

A

The New Technology loader is the boot loader for all Windows

NT based operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

ntoskrnl.exe

A

This file is the Windows kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

HKEY_CLASSES_ROOT

HKCR

A

The key stores information on how Windows is
supposed to handle different types of files and the
associated programs to run them. This is called
object linking and embedding (OLE).

59
Q

HKEY_CURRENT_USER

HKCU

A

The key stores configurations for the current user
such as control panel icons, screen resolution,
screen colors, and user folders

60
Q

HKEY_LOCAL_MACHINE

HKLM

A

The key stores system hardware profile, as well
as all the settings and user preferences for all
user accounts. This hive is independent of the
specific user application settings, unlike HKCU
and HKU. This is also where the five registry
hives are located: Security Accounts Manager
(SAM), Security, Software, Default, and
Hardware. This is the most important registry root
key. If SAM or any of the other hives is not
present upon start up, the blue screen will be
displayed and the computer will not be able to
boot into the OS until the missing hive is replaced.

61
Q

HKEY_USERS (HKU)

A

The key stores configuration information for all
user profiles. If the computer is on a domain, the
user profiles will not be located here; rather, they
will be found on the domain controller. The
physical data is stored in C:\Documents and
Settings\%USERNAME%\ntuser.dat.

62
Q

HKEY_CURRENT_CONFIG

HKCC

A

The key stores the current hardware profile.
These settings are deleted and re-populated each
time the computer is rebooted, so as to reflect any
changes made to the hardware. The root key is
populated by the hardware abstraction layer
(Hal.dll), which reports directly to the kernel.

63
Q

Assembly Language

A

Assembly language consists of a set of limited, basic
commands, which are translated into machine language and
executed.

64
Q

Commercial Software

A

Commercial software is considered to be closed source
because it refers to proprietary software, where the code is
not freely available for outside programmers to modify and
redistribute. Users of this software have to agree to an End
User Licensing Agreement (EULA) that prohibits them from
reverse engineering the software.

65
Q

File Allocation Table

A

The FAT file system is comprised of two main components—
a file allocation table and the data. The file allocation table
stores pointers known as symbolic links indicating where the
data files are stored on the hard drive.

66
Q

First Generation

Language

A

The first generation programming language was machinelevel
coding also known as native code. It was faster and
more efficient because it was executed directly from the
CPU.

67
Q

Fifth Generation

Language

A

The focus of fifth generation languages is on implementing
artificial intelligence—that is using the computer’s ability to
solve a given problem without the programmer.

68
Q

Fourth Generation

Language

A

Fourth generation languages are object-oriented and

focused on developing commercial business software.

69
Q

High-Level Language

A

A high-level language is a programming language which
requires a compiler to interpret the high-level code and
translate it into assembly language

70
Q

Linux

A

Linux is a free, open source OS. The most popular Linux

distribution is Ubuntu, built from the Debian framework.

71
Q

Machine Language

A

Machine language is binary language. When a program is
executed on a computer, its source code is translated into a
binary set of instructions, which are then processed and
executed.

72
Q

Master Boot Record

A

The Master Boot Record (MBR) is stored within the FAT and
is responsible for holding a hard drive’s primary partition
table. The MBR provides instructions for the operating
system to start up.

73
Q

Master File Table

A

The Master File Table (MFT) is a part of the NTFS and
stores information on every file and directory on the NTFS
file system volume. It is a sophisticated equivalent of the
FAT.

74
Q

Microsoft Management

Console

A

The Microsoft Management Console (MMC) allows system
administrators to control local and group policies, monitor
hardware, and view event log files.

75
Q

Microsoft System

Configuration Utility

A

The MS Config utility determines which applications run
when the operating system starts up. It can also be used to
control the default booting mode.

76
Q

New Technology File

System

A

The NTFS file system is an improvement over FAT. It is
more reliable, includes fault tolerance, and keeps track of
hard disk errors. It also maintains transaction logs, which is
an important feature because it helps in recovering files in
case the hard disk crashes.

77
Q

*nix

A

*nix is a colloquial expression that represents either the Unix
or Linux operating system. This terminology can be applied
to variants of both Unix and Linux to include FreeBSD,
Solaris, Ubuntu, Debian, Slackware, and Gentoo. The
underlying reason why *nix represents both operating
systems is because the two share similar functionality as an
operating system, including utilizing similar kernels, shell
commands, system permissions, and file systems.

78
Q

Open Source Software

A

e Open source software is freely distributable software, which
in most cases allows the user access to the source code.
Open source software must meet specific criteria to be
copyrighted under the GNU public license

79
Q

Second Generation

Language

A

Second generation programming languages were

categorized by assembly-level coding.

80
Q

Snap-Ins

A

A snap-in is a program that contains a part of the
management functionality. It needs to be explicitly enabled
to interact with the MMC console. A snap-in contains various
elements, such as nodes, views, and context menus, which
form part of the management solution.

81
Q

Task Manager

A

The Task Manager window displays system performance,
active applications, processes, and running services. The
task manager is also for killing unresponsive applications
and processes.

82
Q

Third Generation

Language

A

Third generation languages were created in the late 1950s

and refined the usability of the language.

83
Q

Windows Firewall

A

The Windows firewall safeguards the system from malicious

traffic entering or exiting the computer.

84
Q

Windows NT

A

Windows NT, a family of operating systems, was released in
1993. It was the first fully 32-bit version of Windows. Its
consumer-oriented counterparts Windows 3.1x and
Windows 9x, were 16-bit/32-bit hybrids. In 1998, Bill Gates
said that NT stood for New Technology for marketing
purposes, it originally stood for N-Ten, the codename of the
Intel i860 XR processor for which NT was initially developed.

85
Q

Windows Registry

A

The Windows registry is a collective hub for storing a
multitude of settings which are user, system, and application
related.

86
Q

Windows Security

Center

A

The Windows Security Center or Action Center provides an

overall report on the status of the OS’ security.

87
Q

ANSI

A

American National Standards Institute (ANSI) is composed
of more than a thousand representatives from various
industries and the government. ANSI represents the United
States in setting international standards.

88
Q

Client-Side Language

A

A client-side language is the Web programming code that

runs on the computer of the user viewing the Web content.

89
Q

Domain Parking

A

When a company registers a domain name similar to their
existing name, but does not use the domain, that is domain
parking. Usually, companies set up an HTTP redirect from
the parked page to the existing domain.

90
Q

Domain Squatting

A

Domain squatting is registering a domain name similar to
an existing one with the intention to profit from the other
domain’s client base.

91
Q

Electronic Industries Alliance

A

Electronic Industries Alliance (EIA) is a trade organization
that sets standards for its members, helps write ANSI
standards, and lobbies for legislation favorable to growth of
the computer and electronics industries.

92
Q

HTTP Methods

A

HTTP methods are set of procedures used by a browser
such as Internet Explorer to access and interact with Web
sites.

93
Q

Institute of Electrical and

Electronics Engineers

A

nstitute of Electrical and Electronics Engineers (IEEE) is an
international society composed of engineering professionals
whose goals are to promote development and education in
electrical engineering and computer science.

94
Q

International Organization for

Standardization

A

International Organization for Standardization (ISO) is a
collection of organization standards representing 146
countries whose goal is to establish international
technological standards to facilitate global exchange of
information and barrier-free trade.

95
Q

International

Telecommunication Union

A

International Telecommunication Union (ITU) is a standards
organization that regulates international
telecommunications, such as radio and TV frequencies,
satellite and telephony specifications, networking
infrastructure, and it is involved in setting tariffs for global
communications.

96
Q

IP Address

A

Multicasting is a one-to-many approach to data distribution;
it is the process by which data is transmitted over a network
to multiple recipients simultaneously.

97
Q

Object

A

An object refers to the document object and every HTML

element (tag) resides within the object.

98
Q

Open Systems

Interconnection Model

A

l
The Open Systems Interconnection Model (OSI) model is a
seven-layer networking model used to depict how devices
in a network infrastructure are connected to each other.

99
Q

Packet Sniffing

A

Packet sniffing is a technique used to see the information

passing over a network.

100
Q

Private IP Classes

A

Private IP classes contain a list of IP addresses used by
private TCP/IP LANs that do not need to be accessed by
the public.

101
Q

Public IP Classes

A

Public IP classes contain a list of IP addresses publicly

registered with the Network Information Centre (NIC).

102
Q

Request for Comments

A

RFC stands for request for comments. It is a document that
contains an idea developed by a committee for public
review before the idea is accepted as a standard.

103
Q

Server-Side Language

A

A server-side language is the Web programming code that

runs on the server that holds the Web content.

104
Q

Telecommunications Industry

Association

A

Telecommunications Industry Association (TIA) is a
standards organization for information technology (IT),
wireless, satellite, fiber optics, and telephone equipment.

105
Q

TCP/IP model

A

It is a four-layer networking model that depicts how

computers can connect to one another

106
Q

Three-Way Handshake

A

The process to establish a connection between networked
devices such as a client and server is called a three-way
handshake.

107
Q

Application Layer

A

Application layer is the top layer of the Open System
Interconnectivity (OSI) model. This layer performs
common application services and sends data from one
network to another. This layer is home to the FTP,
HTTP, and e-mail protocols.

108
Q

Buffer Overflow

A

A buffer overflow takes place when a data storage area

tries to store more or less than its actual capacity.

109
Q

Buffer Underflow

A

A buffer underflow takes place when the buffer is fed

data at a lower speed than the data being read.

110
Q

CIA Triad

A

Information security is based on the three core
principles that must be adhered to. These principles
are confidentiality, integrity, and availability which form
the CIA triad.

111
Q

Digital Certificate

A

Digital certificates are electronic documents that use
digital signatures to associate a public key with a
user’s identity

112
Q

Digital Identity

A

Digital identity is the Internet profile of a person and is
equivalent to the real identity of that person, but in the
digital world

113
Q

Digital Signature

A

A digital signature validates the authenticity of a digital

message or document.

114
Q

E-Commerce

A

E-commerce or electronic commerce consists of the
buying and selling of goods and services on the
Internet.

115
Q

Hash Function

A

Hash functions are a mathematical approach to
transform a variable length piece of data into a fixed
length, random character output.

116
Q

Message Digest

A

The output from the hash function is called a message

digest.

117
Q

PAIN

A

Privacy, authentication, integrity, and nonrepudiation
(PAIN) is an expanded view of the primary goals of
information security.

118
Q

Proxy

A

A proxy server acts as an intermediary for requests
sent from users who want to access resources from
other servers on the Internet.

119
Q

PKI

A

A public key infrastructure (PKI) contains components
that enable users of an unsecured public network to
exchange data and money securely by using a public
and a private cryptographic key obtained through a
trusted authority.

120
Q

SQL Injection

A

SQL injection is a code injection technique that exploits

security vulnerability in the database of an application.

121
Q

Symmetric Encryption

A

Symmetric encryption is a number or a string of letters
which is applied to a message to change it in a
particular way.

122
Q

Three-Way Handshake

A

The process to establish a connection between
networked devices such as a client and server is called
a three-way handshake.

123
Q

Tunneling

A

Tunneling is a method used by two servers to securely

transfer data between them.

124
Q

VPN

A

A virtual private network (VPN) is a network that uses a
public telecommunication infrastructure to provide
users with secure access to their organization’s
network.

125
Q

Web 2.0

A

Web 2.0 refers to applications that facilitate interactive
information sharing, interoperability, user-centric
design, and collaboration on the World Wide Web.

126
Q

XSS

A

Cross-site scripting (XSS) is a type of computer
security vulnerability in which malicious scripts are
injected into trusted Web sites.

127
Q

Adware

A

An adware is any software application that
automatically displays or downloads advertisements to
a computer after the software is installed on it or while
the application is being used.

128
Q

Antivirus Software

A

Antivirus software is software that is used to track and

treat computer viruses.

129
Q

Application Programming

Interface

A

An application programming interface (API) is an
interface implemented by a software program that
allows for direct communication to the program through
routines in the code, allowing for a developer to
enhance portions the existing code. For example,
Google provides an API for some of their application,
such as Google Health.

130
Q

Backdoor

A

A backdoor is a secret access point to a computer

system that circumvents the normal security.

131
Q

Botnet

A

A botnet is a collection of malicious software agents

that run autonomously and automatically.

132
Q

Computer Hack

A

Computer hack is a method used to obtain
unauthorized access to a computer or computer
network

133
Q

Computer Port

A

Computer port is a hardware circuitry used to link one

device with another.

134
Q

Computer Service

A

Computer service is a set of functionalities derived

from running a program.

135
Q

Cryptovirology

A

Cryptovirology is the field of utilizing cryptography to
design powerful malicious software that makes
unpacking and reverse engineering of software
extremely difficult.

136
Q

Kernel Module

A
Kernel module is a file that contains code to expand
the central component of an operating system.
137
Q

Malware

A

Malware is any piece of software that is ill intentioned,
often residing on the computer system to perform
malicious actions including spying on the user,
subverting security settings, deleting or damaging data,
or otherwise inconveniencing the user, or programs
with other malicious intent.

138
Q

Rootkit

A

A rootkit is a collection of programs that enables a
cracker to mask intrusion and gain root or privileged
access to a computer on a network.

139
Q

Shell Command

A

Shell command is an interface used to execute

operating system commands.

140
Q

Spyware

A

Spyware is a program that collects various types of
personal information, such as Internet surfing habits
and sites visited by a user

141
Q

Trojan

A

A trojan is malicious file disguised as a benign file that
appears to perform a desirable function for the user
prior to its execution or installation, but instead
provides unauthorized access to the user’s computer
system through the creation of a backdoor.

142
Q

Virus

A

A virus is a software program capable of causing harm

to files or programs on the computer

143
Q

Worm

A

A worm is a malicious file that uses active network
connections to spread from one host computer to
another