Sec++ icollege Flashcards

Types of Malware and ports

1
Q

Forward Proxy

A

Type of proxy that inspects outbound data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of proxy that inspects outbound data

A

Forward Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reverse Proxy

A

Type of proxy that inspects inbound data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of proxy that inspects inbound data

A

Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIPS

A

Device that can detect and prevent network attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Device that can detect and prevent network attacks

A

NIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIDS

A

Device that can only detect network attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Device that can only detect network attacks

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Domain hijacking

A

Maliciously taking over somebody else’s domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maliciously taking over somebody else’s domain

A

Domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whaling

A

Social engineering attack that steals data from a CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering attack that steals data from a CEO

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear Phishing

A

Social engineering attack that steals company data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social engineering attack that steals company data

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adware

A

Malware that pushes unwanted advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware that pushes unwanted advertisements

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spyware

A

Malware that steals information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware that steals information

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zero - day vulnerability

A

Vulnerabilities that are known to others or the software developer with either no fix or the fix was just released and not everyone has patched their systems yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A computer threat that tries to exploit computer application vulnerabilities that are known to others or the software developer with either no fix or the fix was just released and not everyone has patched their systems yet.

A

Zero - day attack or threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bot/ Zombie/ Drone

A

Infected computer controlled by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Infected computer controlled by an attacker

A

Bot/ Zombie/ Drone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Worm

A

Type of malware that can self-replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Type of malware that can self-replicate

A

Worm

25
Q

Key that is meant to be exchanged

A

Public Key

26
Q

Public Key

A

Key that is meant to be exchanged

27
Q

Private Key

A

Key that is meant to be kept secret.

28
Q

Key that is meant to be kept secret.

A

Private Key

29
Q

Port number of SNMP

A

161

30
Q

161

A

Port number of SNMP

31
Q

Port number of SSH

A

22

32
Q

22

A

SSH

33
Q

636

A

Port number of LDAPS

34
Q

Port number of LDAPS

A

636

35
Q

443

A

Port number of SSL/TLS

36
Q

Port number of SSL/TLS

A

443

37
Q

22

A

Port number of SFTP

38
Q

Port number of SFTP

A

22

39
Q

Port number of Secure IMAP

A

993

40
Q

993

A

Port number of Secure IMAP

41
Q

Port number of Secure POP

A

995

42
Q

995

A

Port number of Secure POP

43
Q

TCP 53

A

Port number of DNS Zone Transfer

44
Q

Port number of DNS Zone Transfer

A

TCP 53

45
Q

TCP 443

A

Port number of HTTPS

46
Q

Port number of HTTPS

A

TCP 443

47
Q

TCP 80

A

Port number of HTTP

48
Q

Port number of HTTP

A

TCP 80

49
Q

UDP 53

A

Port number of DNS Query

50
Q

UDP 53

A

UDP 53

51
Q

Port number of DNS Zone Transfer

A

TCP 53

52
Q

TCP 53

A

Port number of DNS Zone Transfer

53
Q

In computer networks, a ______ _______ is a server that acts as an intermediary for requests from clients seeking resources from other servers.

A

proxy server

54
Q

proxy server

A

a server that acts as an intermediary for requests from clients seeking resources from other servers.

55
Q

A ____ query is the process of a computer or networking device making an inquiry to get an IP address for a DNS name such as w3.org.

A

DNS

56
Q

The client computer sends a DNS query to one of their internet service provider’s DNS servers.

A

DNS query

57
Q

zone transfer

A

a normal operation between primary and secondary DNS servers in order to synchronise the records for a domain.

58
Q

a normal operation between primary and secondary DNS servers in order to synchronise the records for a domain.

A

zone transfer