Sec++ icollege Flashcards

Types of Malware and ports

1
Q

Forward Proxy

A

Type of proxy that inspects outbound data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of proxy that inspects outbound data

A

Forward Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reverse Proxy

A

Type of proxy that inspects inbound data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of proxy that inspects inbound data

A

Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIPS

A

Device that can detect and prevent network attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Device that can detect and prevent network attacks

A

NIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIDS

A

Device that can only detect network attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Device that can only detect network attacks

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Domain hijacking

A

Maliciously taking over somebody else’s domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maliciously taking over somebody else’s domain

A

Domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whaling

A

Social engineering attack that steals data from a CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering attack that steals data from a CEO

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear Phishing

A

Social engineering attack that steals company data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social engineering attack that steals company data

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adware

A

Malware that pushes unwanted advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware that pushes unwanted advertisements

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spyware

A

Malware that steals information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware that steals information

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zero - day vulnerability

A

Vulnerabilities that are known to others or the software developer with either no fix or the fix was just released and not everyone has patched their systems yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A computer threat that tries to exploit computer application vulnerabilities that are known to others or the software developer with either no fix or the fix was just released and not everyone has patched their systems yet.

A

Zero - day attack or threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bot/ Zombie/ Drone

A

Infected computer controlled by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Infected computer controlled by an attacker

A

Bot/ Zombie/ Drone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Worm

A

Type of malware that can self-replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Type of malware that can self-replicate

25
Key that is meant to be exchanged
Public Key
26
Public Key
Key that is meant to be exchanged
27
Private Key
Key that is meant to be kept secret.
28
Key that is meant to be kept secret.
Private Key
29
Port number of SNMP
161
30
161
Port number of SNMP
31
Port number of SSH
22
32
22
SSH
33
636
Port number of LDAPS
34
Port number of LDAPS
636
35
443
Port number of SSL/TLS
36
Port number of SSL/TLS
443
37
22
Port number of SFTP
38
Port number of SFTP
22
39
Port number of Secure IMAP
993
40
993
Port number of Secure IMAP
41
Port number of Secure POP
995
42
995
Port number of Secure POP
43
TCP 53
Port number of DNS Zone Transfer
44
Port number of DNS Zone Transfer
TCP 53
45
TCP 443
Port number of HTTPS
46
Port number of HTTPS
TCP 443
47
TCP 80
Port number of HTTP
48
Port number of HTTP
TCP 80
49
UDP 53
Port number of DNS Query
50
UDP 53
UDP 53
51
Port number of DNS Zone Transfer
TCP 53
52
TCP 53
Port number of DNS Zone Transfer
53
In computer networks, a ______ _______ is a server that acts as an intermediary for requests from clients seeking resources from other servers.
proxy server
54
proxy server
a server that acts as an intermediary for requests from clients seeking resources from other servers.
55
A ____ query is the process of a computer or networking device making an inquiry to get an IP address for a DNS name such as w3.org.
DNS
56
The client computer sends a DNS query to one of their internet service provider's DNS servers.
DNS query
57
zone transfer
a normal operation between primary and secondary DNS servers in order to synchronise the records for a domain.
58
a normal operation between primary and secondary DNS servers in order to synchronise the records for a domain.
zone transfer