Test 1 Flash Flashcards

1
Q

What is a Virus?

A

A program that self replicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Anti-Virus?

A

A list known viruses that protects your computer from these virus and should be updated always

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two ways to avoid virus?

A

Policies

Anti-Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan?

A

A Trojan horse is a program that looks benign but has malicious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buffer Overflow

A

is an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spyware?

A

Spyware is simply software that literally spies on what you do on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Spyware used for?

A

Keyloggers
Spying through webcam
Legal Privacy concerns with employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is spam?

A

Spam is email that is sent out to multiple parties, that is unsolicited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 6 common techniques used by hackers?

A
Data Collection
Passive
Active
Port Scanning
Packet Sniffer
SQL Injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Passive Scanning that a hacker does?

A

passive scanning is just looking at available information to the public so they don’t see that you are looking at them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Active Scanning?

A

Active scans are far more reliable then passive but may be detected by the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is port scanning?

A

Port Scanning is the process of attempting to contact each network port on the target system and see which ones are open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two most used quotes in class?

A

1) “If it sounds to good to be true, it probably is!”

2) “Don’t trust anyone!”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SQL Script Injection?

A

This attack is based on passing structured query language commands to a web application and getting the website to execute them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a handshake?

A

This combines the elements of SYN, SYN+ACK and ACK…(three-way handshake)

1) Client sends a packet with the SYN flag
2) Server allocates resources for the client and then responds with the SYN and ACK flags set.
3) Client responds with the ACK flag set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SYN ?

A

Synchronize - This packet is asking the target server to please synchronize communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cyber Stalking?

A

Any use of electronic communications to stalk a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two most used quotes in class?

A

1) “If it sounds to good to be true, it probably is!”

2) “Don’t trust anyone!”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a SQL Script Injection?

A

This attack is based on passing structured query language commands to a web application and getting the website to execute them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a packet sniffer?

A

A program that captures data as it travels across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is data collection?

A

If you collect data from multiple sources you can combine and use for identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DOS - Strengths and weaknesses?

A

1) Strength = easy to perform, do not require a great deal of sophistication on the part of perpetrator, and can have devastating effects on the target system.
2) Weaknesses = you need a really fast computer or many computers to overwhelm another computer, website, or network. (performing DDOS - distributed denial of service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a handshake?

A

“It’s like two computers hooking up and making baby computers”

24
Q

SYN ?

A

Synchronize - This packet is asking the target server to please synchronize communications.

25
Q

What is spear phishing?

A

Spear Phishing is using the same technology in a targeted manner. For example, if an attacker wanted to get into the servers at a defense contractor, he might craft email and phishing websites specifically to target software and network engineers at that company.

26
Q

MAC address

A

Media Access Control - are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi.

27
Q

User Interface

A

User and a computer system interact, in particular the use of input devices and software.

28
Q

What is low tech espionage

A

Corporate espionage without the computers and internet disgruntled employees are the biggest threat

29
Q

Session Hijacking

A

AKA: Cookie Hijacking the exploitation of a valid Computer session, known as a session key to authorized access to information or servers in a computer system.

30
Q

Odds of Attack

A

How likely are you to be attacked? what do you have?

31
Q

Security Devices

A

Fire Wall - Barrier between network and outside world
Proxy Server - Often Used with a firewall to hide the internal networks IP and present a single IP (its own) to the world
Intrusion Detection - IDS simply monitors traffic for suspicious activity

32
Q

Security Activities

A

Authentication - username and password

Auditing - Process of reviewing logs, records, procedures to determine if their items meet standards

33
Q

Physical Connections

A

Hub - Hardware that links computer and all information is shared
Switch - A smarter hub and can hide information from other users on the same network or switch
Router - Internet signal booster and also used as a smarter switch allowing for more users and its own safety features.
Repeater - is an electronic device that receives a signal and re-transmits it.

34
Q

Ports

A

n endpoint of communication in an operating system.

35
Q

IP address and URL

A

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network. URL is the site

36
Q

DNS Server

A

Domain Service Name - runs special-purpose networking software, features a public IP address, and contains a database of network names and addresses for other Internet hosts.

37
Q

IPconfig

A

Displays only the IP address, subnet mask, and default gateway values for each adapter

38
Q

Ping

A

Used to test the reachability of a host on an Internet Protocol (IP) network

39
Q

Tracert

A

Diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network

40
Q

NsLookup

A

Tool used for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.

41
Q

Netstat

A

A command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing)

42
Q

Whois

A

A query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource

43
Q

OSI Modle

A

Its goal is the interoperability of diverse communication systems with standard protocols.

44
Q

MAC address

A

Media Access Control - are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi.

45
Q

Why do we need Encryption?

A

Encryption is important because it allows you to securely protect data that you don’t want anyone else to have access to.

46
Q

SYN + ACK?

A

Synchronize and acknowledged

47
Q

ACK?

A

Acknowledge - flag sent after the SYN +ACK is sent to finalize three-way communications.

48
Q

Smurf Attack?

A

Attack which causes a network to perform a DoS on one of it’s own servers.

49
Q

What is a Flood Attack?

A

A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target’s system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.

50
Q

What is the Ping of Death?

A

Attack dependent on sending packets too large for the server to handle.

51
Q

What is a teardrop attack?

A

A teardrop attack is a denial-of-service (DoS) attack that involves sending fragmented packets to a target machine. Since the machine receiving such packets cannot reassemble them due to a bug in TCP/IP fragmentation reassembly, the packets overlap one another, crashing the target network device.

52
Q

What is Land attack?

A

Land attack drives the system crazy by attempting to send a message “to and from” itself

53
Q

Echo/Chargen Attack?

A

Creating a spoofed network session that appears to come from the local systems echo service and which is pointed at the chargen service to form a “loop”. This causes the system to pass large amount of data in an endless loop.

54
Q

What is a Public key encryption?

A

A public key encryption is essentially the opposite of single-key encryption. With any public key encryption algorithm, one key is used to encrypt a message (called the public key).

55
Q

User Interface

A

User and a computer system interact, in particular the use of input devices and software.

56
Q

What is low tech espionage

A

Corporate espionage without the computers and internet disgruntled employees are the biggest threat

57
Q

High tech espionage

A

More of a black hat style of hacking