13.1 Flashcards

1
Q

Most common threat to computers

A

Malware disrupts computers and networks.
It can change configurations, delete files, steal information, or redirect web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses
First and most common type of malware

A

Viruses require user action to spread.
They attach to programs or documents and infect the computer when opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan Horses
Disguised malicious programs

A

Trojan horses appear useful but contain hidden malware.
They are often downloaded with free software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Malware

A

Adware: displays unwanted ads
Ransomware: encrypts files and demands a ransom

Rootkits: gain administrator access

Spyware: steals user information

Worms: self-replicating programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anti-Malware Software

A

Anti-malware software protects computers from malware.
It detects and blocks various threats.
It updates regularly with new threat signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Signature File Updates

A

Anti-malware software needs regular updates to detect new threats.
Download updates from the manufacturer’s website or trusted mirrors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remediating Infected Systems

A

Removing malware may require rebooting in Safe Mode.
A specialist might be needed for complete cleaning.
Reformat and reinstall the OS as a last resort.
Delete system restore files after cleaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Attacks
Networks are targets

A

Attackers use various tools to gather information about target networks.
They then exploit vulnerabilities to gain access or disrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Attacks - Types

A

Denial-of-Service (DoS): overwhelms a target with traffic

Distributed DoS (DDoS): uses multiple attackers

DNS Poisoning: redirects users to malicious servers

Man-in-the-Middle: attacker intercepts communication between two hosts.

Spoofing: attacker disguises their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zero-Day

A

Zero-day refers to a newly discovered vulnerability.
Software is vulnerable until a patch is released.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protecting Against Network Attacks

A

A layered security approach is essential.
Secure all network devices (routers,
switches).
Stay updated on vulnerabilities and apply patches promptly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering

A

Social engineering deceives users into giving away confidential information.

It exploits human trust and willingness to help.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Engineering Techniques

A

Pretexting: creating a false scenario to obtain information

Phishing: sending fraudulent emails disguised as trusted sources

Spam: unsolicited emails with malicious content

Baiting: leaving infected media in public places

Impersonation: pretending to be someone else

Shoulder surfing: stealing information by looking over someone’s shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly