ch 2 malicous actvity Flashcards

1
Q

macro virus

A

Usually placed in documents and e-mailed to users in the hopes that
the users will open the document, thus executing the virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Polymorphic

A

Can change every time it is executed in an attempt to avoid antivirus
detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Armored:

A

tricking the program

into thinking that it is located in a different place from where it actually resides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multipartite:

A

hybrid of boot and program viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

virus

A

code that runs on a computer without the user’s knowledge; it infects
the computer when the code is accessed and execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

worm

A

program that self replicates itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

rootkit

A

gain administrator w/o user knowledge

BIOS, boot loader, kernel, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

threat vector .

A

threat uses to access a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

attack vector .

A

attacker gains access to a computer in order to deliver

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

botnet

A

group of compromised computers,
individual compromised computers in
the botnet are called zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privilege escalation

A

bugging a pc to gain resources .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

logic bomb

A

code that has, in some way, been inserted into software

meant to do malicious stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Applications

A

host-based
intrusion detection system (HIDS
installed directly within an operating system, so it is NOT considered to be an
“INLINE” device,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ADV HIDS

A

interpret encrypted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DIS HIDS

A

price, storage, amount resources and something happens to computer thae database is UNAVA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIDS):

A

can be loaded or stand alone
checks packets for more than 1 pc
INLINE device

17
Q

adv nids

A

cheaper, less resources,

18
Q

dis nids

A

cannot monitor for

things that happen within an operating system

19
Q

IDS mopnitoring Statistical anomaly:

A

establishes a performance baseline if dont match up it sends an alarm to admin

20
Q

IDS mopnitoring Signature-based

A

Network traffic is analyzed for predetermined attack patterns,

21
Q

False positive:

A

dentifies legitimate activity as something malicious.

ex good would be bad traffic

22
Q

False negative:

A

identifies an attack as legitimate activity

common if it dont have an updated attack signature’

23
Q

content filtering

A

block external files that use JavaScript or images

24
Q

Securing the BIOS

A

BIOS PASSWORD
FLASH THE BIOS (UPDATING IT)
CHANGE THE BIOS ORDER