Quiz 3 Flashcards
A \_\_\_\_ attack prevents legitimate users from accessing network resources. Answer buffer overflow session hijacking social engineering DoS
DoS
A \_\_\_\_ can replicate itself, usually through an executable program attached to an e-mail. Answer shell virus keylogger rootkit
virus
A \_\_\_\_ is created after an attack and usually hides itself within the OS tools, so it’s almost impossible to detect. Answer toolbox rootkit shell macro virus
rootkit
A(n) ____________________ is a virus encoded as a macro in programs that support a macro programming language, such as Visual Basic for Applications (VBA).
macro virus
Antivirus software compares ____________________ of known viruses against the files on the computer; if there’s a match, the software warns you that the program or file is infected.
signatures
programming code
Describe an example of a macro virus.
The most infamous macro virus is Melissa, which appeared in 1999. The virus was initiated after a user opened an infected document; the virus then sent an e-mail message to the first 50 entries it located in the infected computer’s address book.
IDS stands for \_\_\_\_. Answer Intrusion Detection System Information Dissemination System Information Destruction System Intruder Dispersal System
Intrusion Detection System
In a \_\_\_\_ attack, a programmer finds a vulnerability in poorly written code that doesn’t check for a defined amount of memory space use. Answer buffer overflow DoS DDoS session hijacking
buffer overflow
Malware programs cannot be detected by antivirus programs.
False
PKI stands for \_\_\_\_. Answer Public Key Infrastructure Private Key Infrastructure Protected Key Infrastructure Primary Key Infrastructure
Public Key Infrastructure
Software keyloggers behave like \_\_\_\_ and are loaded on a computer. Answer Trojan programs viruses shells firewalls
Trojan programs
Some security professionals use fear tactics to scare users into complying with security measures. Is this a good tactic?
Some security professionals use fear tactics to scare users into complying with security measures. Their approach is to tell users that if they don’t take a particular action, their computer systems will be attacked by every malcontent who has access to the Internet. This method is sometimes used to generate business for security testers and is not only unethical, but also against the OSSTMM’s Rules of Engagement. The rule states: “The use of fear, uncertainty, and doubt may not be used in the sales or marketing presentations, websites, supporting materials, reports, or discussion of security testing for the purpose of selling or providing security tests. This includes but is not limited to crime, facts, criminal or hacker profiling, and statistics.”
Your approach to users or potential customers should be promoting awareness rather than instilling fear. You should point out to users how important it is not to install computer programs—especially those not approved by the company—on their desktops because of the possibility of introducing malware. Users should be aware of potential threats, not terrified by them.
The most effective approach to protect a network from malware being introduced is to conduct structured training of all employees and management.
True
Trojan Programs can install a backdoor or \_\_\_\_ on a computer. Answer rootkit shell worm macro virus
rootkit
To represent 0 to 63 characters you need only \_\_\_\_ bits. Answer four five six seven
six