System Security Threats Flashcards
Which type of threat is mitigated by shredding paper documents?
Rootkit
Spyware
Physical
Physical
Shredding document prevents physical threats such as theft of those documents or acquiring information from them
Which of the following statements are true? (Choose two.)
Worms log all typed characters to a text file.
Worms propagate themselves to other systems.
Worms can carry viruses.
Worms infect the hard disk MBR.
Worms propagate themselves to other systems.
Worms can carry viruses.
Worms are programs that multiply and self-propagate over the network, and they sometimes carry viruses (the worm is the delivery mechanism, and viruses must be attached to a file)
One of your users, Christine, reports that when she visits web sites, pop-up advertisements appear incessantly. After further investigation, you learn one of the web sites she had visited had infected Flash code. Christine asks what the problem was. What do you tell her caused the problem?
Cross-site scripting attack
Worm
Adware
Adware
Adware is responsible for displaying pop-up advertisements pertaining to a user’s interest, usually as a result of spyware
Which description best defines a computer virus?
A computer program that replicates itself
A computer program that gathers user information
A computer program that runs malicious actions
A computer program that runs malicious actions
Viruses are applications that run malicious actions without user consent
An exploit connects to a specific TCP port and presents the invoker with an administrative command prompt. What type of attack is this?
Botnet
Trojan
Privilege escalation
Privilege escalation
Privilege escalation occurs when a user gains higher rights than she should have, either because she was given too many rights or because of a security flaw
Ahmid is a software developer for a high-tech company. He creates a program that connects to a chat room and waits to receive commands that will gather personal user information. Ahmid embeds this program into an AVI file for a current popular movie and shares this file on a P2P file-sharing network. Once Ahmid’s program is activated as people download and watch the movie, what will be created?
Botnet
DDoS
Logic bomb
Botnet
Botnets consist of computers infected with malware that are under hacker control
A user reports USB keyboard problems. You check the back of the computer to ensure the keyboard is properly connected and notice a small connector between the keyboard and the computer USB port. After investigating, you learn that this piece of hardware captures everything a user types in. What type of hardware is this?
Smartcard
Trojan
Keylogger
Keylogger
Hardware keyloggers capture every keystroke and store them in a chip
What is the difference between a rootkit and privilege escalation?
Rootkits propagate themselves.
Privilege escalation is the result of a rootkit.
Rootkits are the result of privilege escalation.
Privilege escalation is the result of a rootkit.
Rootkits conceal themselves from operating systems and allow remote access with escalated privileges
Which of the following are true regarding backdoors? (Choose two.)
They are malicious code.
They allow remote users access to TCP port 26.
They are made accessible through rootkits.
They provide access to the Windows root account.
They are malicious code.
They are made accessible through rootkits.
Malicious code produces undesired results, such as a rootkit providing access to a backdoor
You are hosting an IT security meeting regarding physical server room security. A colleague, Syl, suggests adding CMOS hardening to existing server security policies. What kind of security threat is Syl referring to?
Changing the amount of installed RAM
Changing CPU throttling settings
Changing the boot order
Changing the boot order
Changing the boot order means having the ability to boot through alternative means, thus bypassing any operating system controls
You are the IT security officer for a government department. You are amending the USB security policy. Which items apply to USB security? (Choose two.)
Disallow external USB drives larger than 1TB.
Disable USB ports.
Prevent corporate data from being copied to USB devices unless USB device encryption is enabled.
Prevent corporate data from being copied to USB devices unless USB port encryption is enabled.
Disable USB ports.
Prevent corporate data from being copied to USB devices unless USB device encryption is enabled.
Disabling USB ports on a system blocks malicious code on infected USB devices. Forcing USB device encryption ensures data confidentiality of departmental data
Which of the following are not considered serious cell phone threats? (Choose two.)
Hackers with the right equipment posing as cell towers
Having Bluetooth enabled
Changing the boot order
Ransomware
Having Bluetooth enabled
Changing the boot order
Enabling Bluetooth itself is not a threat any more than surfing the Web is. Most Bluetooth devices have security options such as passwords and device trust lists. You cannot change the “boot order” on a cell phone like you can on a computer system
What is defined as the transmission of unwelcome bulk messages?
Worm
Ping of death
Spam
Spam
Spam affects business productivity by consuming enormous amounts of bandwidth and storage space for unsolicited messages
Which technology separates storage from the server?
Router
Switch
NAS
NAS
Network attached storage (NAS) devices are network appliances that contain disks. Client and server operating systems can access this NAS using various protocols such as TCP/IP or Network File System (NFS)
You are responsible for determining what technologies will be needed in a new office space. Employees will need a single network to share data, traditional voice calls, VoIP calls, voice mailboxes, and other services such as call waiting and call transfer. What type of service provides this functionality?
Ethernet switch
PBX
NAS
PBX
A private branch exchange (PBX) offers telecommunication and data networking services in the form of hardware or software. PBXs may exist at the customer’s or provider’s premises
Botnets can be used to set what type of coordinated attack in motion?
DDoS
Cross-site scripting
Privilege escalation
DDoS
Botnets (groups of computers under singular control) can be used to dispatch distributed denial-of-service (DDoS) attacks against hosts or other networks
As a Windows administrator, you configure a Windows networking service to run with a specially created account with limited rights. Why would you do this?
To prevent computer worms from entering the network.
To prevent a hacker from receiving elevated privileges because of a compromised network service.
Windows networking services will not run with administrative rights.
To prevent a hacker from receiving elevated privileges because of a compromised network service.
In the event that the Windows networking service is compromised, it is important that the service not have full rights to the system
Discovered in 1991, the Michelangelo virus was said to be triggered to overwrite the first 100 hard disk sectors with null data each year on March 6, the date of the Italian artist’s birthday. What type of virus is Michelangelo?
Zero day
Worm
Logic bomb
Logic bomb
Logic bombs trigger malicious code when specific conditions are satisfied, such as a date
The Stuxnet attack was discovered in June 2010. Its primary function was to hide its presence while reprogramming industrial computer systems (called PLCs), specifically nuclear centrifuges in an Iranian nuclear power plant. The malware was spread through USB flash drives, with which it transmits copies of itself to other hosts. Which of the following apply to Stuxnet? (Choose two.)
Rootkit
Spam
Worm
Adware
Rootkit
Worm
Stuxnet replicates itself, like worms do, and masks itself while running, like rootkits do
A piece of malicious code uses dictionary attacks against computers to gain access to administrative accounts. The code then links compromised computers together for the purpose of receiving remote commands. What term best applies to this malicious code?
Exploit
Botnet
Logic bomb
Botnet
Botnets are collections of computers under the sole control of the attacker
Windows 8 User Account Control (UAC) enables users to change Windows settings but displays prompts when applications attempt to configure the operating system. Which of the following is addressed by UAC?
Privilege escalation
Adware
Spyware
Privilege escalation
UAC limits software to having only standard user rights and requires authorization for code needing elevated rights
Which of the following items are affected by spyware? (Choose two.)
Memory
IP address
Computer name
Network bandwidth
Memory
Network bandwidth
Spyware is software that gets installed covertly and gathers user information without the user’s knowledge. In some cases, users may suspect it is being installed, such as when free software is being installed. Spyware consumes memory resources because it is normally running all the time. Network bandwidth is used when the spyware sends data to an external source
Juanita uses the Firefox web browser on her Linux workstation. She reports that her browser home page keeps changing to web sites offering savings on consumer electronic products. Her virus scanner is running and is up to date. What is causing this problem?
Firefox on Linux automatically changes the home page every two days.
Juanita is experiencing a denial-of-service attack.
Juanita’s browser configuration is being changed by adware.
Juanita’s browser configuration is being changed by adware.
Adware attempts to expose users to advertisements in various ways, including by displaying pop-ups or by changing the web browser home page. Spyware often analyzes user habits so that adware displays relevant advertisements. Some antivirus software also scans for spyware, but not in this case
Which of the following is true regarding Trojan software?
It secretly gathers user information.
It is self-replicating.
It can be propagated through peer-to-peer file-sharing networks.
It can be propagated through peer-to-peer file-sharing networks.
A Trojan is malicious code that appears to be useful software. For example, a user might use a peer-to-peer file-sharing network on the Internet to download pirated software illegally. The software may install and function correctly, but a Trojan may also get installed. This Trojan could create a backdoor method for attackers to gain access to the system