Objective 3b Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Also known as malware

A

Malicious Logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Piece of malware that replicates by inserting copies of itself into other computer programs or data files

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Self-replicating malware traveling through network without need for human interaction which is main difference between worm and virus

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Program that presents itself as useful but is actually malicious

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malicious code designed to run in response to specific event

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software designed to hide fact system has been infected by malware

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lessens threat or its impact

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Makes users aware of different threats and vulnerabilities

A

Information Assurance Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Day-to-day tasks established by policies in order to ensure users behave properly

A

Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of vulnerability assessment tools to find & track network vulnerabilities

A

Readiness Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to control, prevent, identify, and report vulnerabilities at host and network level to protect networks

A

Internal Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any actions, devices, procedures, or techniques meeting or opposing a threat

A

Counter Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall is software or hardware based network security system controlling incoming and outgoing network traffic

A

Boundary Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scans, audits, and monitors the security infrastructure for signs of attacks in progress

A

Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can protect computer systems by incorporating this

A

Anti-Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly