Security Flashcards

1
Q

Worm

A

Standalone malware computer program that replicates itself to spread to other computers.
Worm can spread on its own, whereas a virus needs a host program or user interaction to propagate itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 7 steps of Malware removal

A

Verify Malware systems
Quarantine infected
Disable System Restore
Remediate (Update anti-virus, Scan and remove)
Schedule scans and run updates
Enable System Protection
Educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rogue Anti-Virus

A

Malicious software that misleads users into believing there is a virus on their computer. So you download a fake antivirus (actual virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pharming

A

Type of social engineer attack that redirects a request for a website to a similar-looking, but fake website.

attacker uses DNS spoofing to redirect the user to the fake site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A

Type of malware designed to deny access to a computer system or data until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Least Privilege Policy

A

Concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

Email or web-based form of phishing that targets senior executive or wealthy individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spear Phishing

A

Attack focused on a target set of people, not just an indiscriminate large group of random people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

An email based social engineering attack in which the attacker sends an email from a supposedly reputable source to try to elicit private info……

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vishing

A

A social-engineering attack where the attacker extracts info while speaking over the phone or leveraging IP-based voice messaging services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cross-site scripting

A

An attack in which the attacker inject malicious code into the Web app in order to trick it into sending things it shouldn’t to other users of the Web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dictionary Attack

A

Attack that uses a list of common passwords to crack a user’s password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What wireless connection type supports an encrypted, but open network

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explicit allow
(Windows Defender Firewall)

A

Only allow an item to traverse the firewall if the traffic matches an existing rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Implicit Allow
(Windows Defender Firewall)

A

Allows all traffic unless there is a specific rule to prevent it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly