184 Computer Security Flashcards

1
Q

Which of the following is a general term that refers to a wide variety of damaging or annoying software programs?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT a technology typically used by spyware?

A

disk drive formatting software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AV software on a computer must have its files regularly updated by downloads from the Internet. These files contain (for each known virus) an extracted sequence of characters found in the virus that serve to uniquely identify it. What file is this?

A

signature file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software that is more annoying than malicious and gets installed on a user computer and is generally free for a trial. What is this called?

A

PUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of malware will hide or remove all traces of evidence that may reveal the malware, such as log entries?

A

ROOTKIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of spyware silently captures and stores each keystroke that a user types on the computer’s keyboard?

A

keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of device is inserted between the computer keyboard connection and USB port for the purposes of stealing information?

A

keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not a preventative feature of antimalware software?

A

application protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of malware masquerades as performing a benign activity but also executes malicious code?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An infected computer that is under the remote control of an attacker

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attacker who controls a botnet

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user

A

PUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware or software designed to limit the spread of malware over a network

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Enhancements to the software to provide new or expanded functionality, but do not address security vulnerabilities

A

feature update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A malicious program designed to enter a computer via a network

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Computer code that lies dormant until it is triggered by a specific logical event

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A database of viruses that is used to identify an infected file

A

signature file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A logical computer network of zombies under the control of an attacker

20
Q

Using what email protocol can mail be organized into folders on the mail server and read from any device?

21
Q

What do web authors use to combine text, graphic images, audio, video, and hyperlinks into a single document?

22
Q

What can be used to run JavaScript in a restricted environment and limit what resources it can access?

A

sandboxing

23
Q

What is contained within the body of an email message as a shortcut to a website?

A

embedded hyperlink

24
Q

The ____________________ is a worldwide set of interconnected computers, servers, and networks.

25
The ____________________ is composed of Internet server computers on networks that provide online information in a specific format.
World Wide Web
26
Which of the following uses graphical images of text in order to circumvent text-based filters?
image spam
27
What do you call an attack where a user logs into a website and is then tricked into loading another webpage that inherits the identity and privileges of the person who logged in?
cross-site request forgery
28
What function expands the normal capabilities of a web browser?
extensions
29
HTTP is based on which larger set of standards for Internet communication?
TCP/IP
30
A series of instructions that are grouped as a single command
macro
31
Computer used as bait to threat actors so that any new attacks can be analyzed
honeypot
32
A series of instructions in computer code that commands a browser to perform specific actions
script
33
Attacks that are based on malicious code sent through third-party advertising networks so that malware is distributed through ads sent to users' web browsers
malvertising
34
Web browser addition that expands the normal capabilities of a web browser for a specific webpage
extension
35
Read-only mode for an Office file
protected view
36
Spam that uses graphical images of text to circumvent text-based filters
image spam
37
unsolicited email
spam
38
File, such as a word processing document, spreadsheet, or picture, that are added to an email message
attachment
39
Which GCP segment type is the largest?
Region
40
Which Azure segment type is largest?
Geography
41
In a cloud environment, which device might be arranged at the presentation tier of a basic three-tier infrastructure?
A user's smartphone
42
A network administrator is configuring a VPC in GCP, and manually enters the routes into a routing table. What kind of routing is this considered?
Static routing
43
Lexa has been asked for the subnet ID and subnet mask in CIDR notation for one of the web servers in the company's private cloud. The web server has an IP address of 192.168.1.200 and a subnet mask of 255.255.255.192. What should she tell them?
192.168.1.192/26
44
Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?
172.30.101.50
45
Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life, and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?
vpc
46
Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?
Virtual firewall
47
Rosita has configured a subnet mask of 255.255.252.0 for the new virtual private cloud she is creating for her organization. One of the junior administrators remarks that he's never seen that kind of a subnet mask before and isn't sure how many devices the subnet would hold. How many devices should Rosita tell him that it will support?
1,022