Threats, Attacks, and Vulnerabilities (Ch.9) Flashcards

1
Q

Protocol used to map known IP addresses to unknown physical addresses.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attack that convinces the network that the attacker’s MAC (Media Access Control) address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s address.

A

Address Resolution Protocol (ARP) poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software that gathers information to pass on to marketers or that intercepts personal data such as credit card numbers and makes it available to third parties.

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software that identifies the presence of a virus and is capable of removing or quarantining the virus.

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A virus that is protected in a way that makes disassembling it difficult. The difficulty makes it “armored” against antivirus programs that have trouble getting to, and understanding, its code.

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any unauthorized intrusion into the normal operations of a computer or computer network.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage.

A

attack surface reduction (ASR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An opening left in a program application (usually by the developer) that allows additional access to data.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An automated software program that collects information on the web. usually a compromised computer being controlled remotely.

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of denial-of-service (DoS) attack that targets poor memory management on a server or application

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Using multiple transparent or opaque layers to trick a user into clicking a button or link on another page when they had intended to click on the top page.

A

clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A virus that creates a new program that runs in the place of an expected program of the same name.

A

companion virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A form of web-based attack in which unauthorized commands are sent from a user that a website trusts.

A

cross-site request forgery (XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Running a script routine on a user’s machine from a website without their permission.

A

cross-site scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of attack that prevents any users—even legitimate ones—from using a system.

A

denial-of-service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The act of attempting to crack passwords by testing them against a list of dictionary words.

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public.

A

distributed denial-of-service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An attack method in which a daemon caches DNS reply packets, which sometimes contain other information (data used to fill the packets). The extra data can be scanned for information useful in a break-in or man-in-the-middle attack.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The DNS server is given information about a name server that it thinks is legitimate when it isn’t.

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The network service used in TCP/IP networks that trans-lates hostnames to IP addresses.

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Putting too much information into too small of a space that has been set aside for numbers.

A

integer overflow

22
Q

Making the data look as if it came from a trusted host when it didn’t

A

IP spoofing

23
Q

A permission method in which users are granted only the privileges necessary to perform their job function.

A

principle of least privilege

24
Q

Any code that is hidden within an application and causes something unexpected to happen based on some criteria being met.

A

logic bomb

25
Q

A software exploitation virus that works by using the macro feature included in many applications, such as Microsoft Office.

A

macro virus

26
Q

Any code that is meant to do harm.

A

malicious code

27
Q

A threat from someone inside the organization intent on doing harm.

A

malicious insider threat

28
Q

An attack that occurs when someone/something that is trusted inter-cepts packets and retransmits them to another party.

A

man-in-the-middle / TCP Highjacking

29
Q

A virus that attacks a system in more than one way.

A

multipartite virus

30
Q

Attempting to ascertain a password that you should not know.

A

password attacks

31
Q

A virus that modifies and alters other programs and databases.

A

phage virus

32
Q

A large Internet Control Message Protocol (ICMP) packet sent to overflow the remote host’s buffer or causes the remote host to reboot or hang.

A

ping of death

33
Q

An attribute of some viruses that allows them to mutate and appear differently each time they crop up.

A

polymorphic

34
Q

The result when a user obtains access to a resource that they wouldn’t normally be able to access.

A

privilege escalation

35
Q

Software that demands payment before restoring the data or system infected.

A

ransomware

36
Q

An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection.

A

replay attack

37
Q

A virus that attacks or bypasses the antivirus software installed on a computer.

A

retrovirus

38
Q

A form of malware that tries to convince the user to pay for a fake threat.

A

rogueware

39
Q

Software program that has the ability to obtain root-level access and hide certain things from the operating system.

A

rootkit

40
Q

Software that tries to convince unsuspecting users that a threat exists.

A

scareware

41
Q

A small library that is created to intercept API calls transparently.

A

shim

42
Q

An attempt by someone or something to masquerade as someone/something else.

A

spoofing

43
Q

Software programs that work—often actively—on behalf of a third party.

A

spyware

44
Q

A virus that attempts to avoid detection by masking itself from applications or by installing itself into the boot sector.

A

stealth virus

45
Q

Any application that masquerades as one thing in order to get past scrutiny and then does something malicious.

A

Trojan horse

46
Q

Creating domains that are based on the misspelling of another.

A

typo squatting

47
Q

Registering domains that are similar to those for a known entity but based on a misspelling or typographical error.

A

URL hijacking

48
Q

A program intended to damage a computer system.

A

virus

49
Q

Identifying a site that is visited by those whom they are targeting, poisoning that site, and then waiting for the results.

A

watering hole attack

50
Q

An advanced attack that tries to get around detection and send a packet with every single option enabled.

A

Xmas attack

51
Q

An attack that begins the very day an exploit is discovered.

A

zero-day exploit

52
Q

Any system taking directions from a master control computer.

A

zombie