Review 2 Flashcards
Week 18
Malware is software designed to infiltrate a computer system without the user’s consent.
True—Malware is software designed to intrude upon a computer system without that user’s knowledge or consent.
The love bug is an example of a rootkit.
False—The love bug is an example of a virus, not a rootkit.
Viruses self-replicate, whereas worms do not.
False—It is the opposite. Worms self-replicate, whereas viruses do not. A user needs to execute the virus for it to replicate.
A RAT is an example of a Trojan horse.
True RAT stands for remote access Trojan and is an example of a Trojan horse attack.
Active interception is the act of exploiting a bug or design flaw in software.
False—Active interception usually includes a computer placed between the sender and the receiver to capture and possibly modify information. Privilege escalation is the act of exploiting a bug or design flaw in software.
Back Orifice is an example of a backdoor.
True—Back Orifice is an example of a backdoor program and is commonly installed by a Trojan horse.
Logic bombs are platonic.
. False—Logic bombs are malicious and can cause damage to computers. They are related to the platonic Easter egg but can definitely cause damage when they are set off.
A master computer controls a botnet
True—A botnet is controlled by a master computer, which sends out instructions to many other computers that have been compromised, known as zombies.
By turning on the phishing filter, a person can prevent spyware.
True—The phishing filter in Internet Explorer can help to prevent spyware. This can be turned on by clicking Turn on Automatic Website Checking.
Opening mail relays can decrease the amount of spam that an organization receives on its email server.
False—Mail relays should be closed on SMTP servers. If the mail relay is open, anyone on the Internet can send email through the SMTP server.
Which of the following can help to prevent spam? (Select the two best answers.)
A. Use a spam filter.
B. Run a Trojan scan.
C. Close open mail relays.
D. Consider technologies that discourage spyware.
A and C. Closing open mail relays and using spam filters are two ways to help prevent spam. Other ways include configuring whitelists and blacklists, and train your users.
Which of the following is an example of a personal software firewall? A. Proxy server B. ZoneAlarm C. Microsoft ISA server D. Antivirus software
B. ZoneAlarm is an example of a personal software firewall. Other examples include Windows Firewall and ipfirewall. A proxy server is a computer placed between the LAN and the Internet that acts as a go-between; it usually caches HTTP requests. Microsoft ISA server is a corporate version of a software-based firewall. Antivirus software might have a built-in firewall, but it might not. Its primary function is to search for and quarantine viruses.
Which of the following is an inline device that checks all packets?
A. Host-based intrusion detection system
B. Statistical anomaly
C. Network intrusion detection system
D. Personal software firewall
C. A network intrusion detection system (NIDS) is an inline device that checks all the packets that flow through it. It is meant to detect attacks and intrusions for the entire network. A host-based intrusion detection system analyzes what happens on that individual computer but not the rest of the network. Statistical anomaly monitoring establishes a performance baseline on an IDS. Personal software firewalls attempt to prevent access to the network.
Which of the following occurs when an IDS identifies legitimate activity as something malicious? A. False-negative B. False-positive C. Monitoring positive D. Misidentification
B. A false positive is when an IDS identifies legitimate activity as something malicious. It is a type of misidentification. False negatives are when the IDS lets an attack intruder on the network thinking it is legitimate. Monitoring positive is another name for an event that was monitored that is known to be true, but this terminology is not often used when referring to an IDS.
Which of the following can help to secure the BIOS of a computer? (Select the two best answers.) A. Use a case lock. B. Use a BIOS supervisor password. C. Configure a user password. D. Disable USB ports.
A and B. By using a case lock or other type of locking mechanism for the computer case, a person cannot open the system and reconfigure the BIOS jumper. By configuring a BIOS supervisor password, only people who know the password can access the BIOS. User passwords can be configured for the BIOS, but these passwords are used only to prevent people who do not know the password from accessing the operating system. Disabling USB ports might be a good idea and will prevent persons from booting the system by way of a USB flash drive or other similar device but will not help to secure the BIOS.