2-5 Flashcards

1
Q

simple tool to use. you select the target, agent, how many sockets, the requests then start the flood

A

DoSHTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

first appeared in July 2012, affects windows 95 to windows 7, and windows server 2003. this was a ________ antovirus

A

fake antivirus or fake AV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

first appeared in 2012, targets windows OS. it was specifically designed for espionage. spyware that can monitor network traffic and take screenshots. found on Iranian govt sites.

A

flame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sco has close ties to

A

microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sco tried to sue distributors of linux claiming there OS’s contained segments of SCO Unix code. the suit was _________

A

unfounded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a cirus that creates a peer-to-peer botnet.. it establishes encrypted communications between the command and control computer and the infected computer.

A

gameover zeus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sirts seen in 2013, well known ransomeware that uses asymetric encryption to lock a users files

A

cryptolocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ransomeware first seen in 2014, similar to cryptolocker, it would communicate with the command and control server and even take screenshots

A

cryptowall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cariation of cryptowall. can steal credentials from infected system

A

TSPY_FAREIT.YOI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

no garaunteed way exists to prevent all DOS attacks. first this you need to do is figure out how the attack was perpetrated. next would be to refuse _____ packets from outside your network.

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a technique used to gain access to users computers. occasionally done simply to mask the origins of a DOS attack

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

intruder sends messages to acomputer system with an IP address indicating thatit came from another IP addressthen it actually came from

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an attacker must find a machine that the target system trusts. next the attacker must modify the packet header of their transmission so it appears it came from that host.

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the idea of IP spoofing was first theorized in the 1980’s by Robert morris when he discovered the weakness in _________ protocol

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly