Block 5 Unit1 C Flashcards

(24 cards)

1
Q

Malicious code is______ or ______ ______ written to intentionally cause undesired effects, security breaches or damage to a system

A

Malware, Websites scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is software designed to infiltrate or damage a computer system without the owner’s informed consent.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware’s most common pathways from criminals to users is though what two methods?

A

Email, World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Viruses are written by people with intent to do what?

A

Harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses are classified into many categories, based on how they____ and the nature of their____.

A

Propagate, Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Boot-Sector Virus resides where?

A

Boot-Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Boot Sector Virus executes when the computer is

A

Booted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A file Infector Virus are also known as a/an____ Virus or_____ Virus, and they operate in memory and infect______ files.

A

Executable, Parasitic, Executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This type of virus is planted on the system by installing a piece of software that contains some code that will not execute until a certain event occurs.

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worms are scary because it has the unique characteristics of being able to_____ itself without needing a user to activate the virus. Worms can replicate themselves in several ways, such as through specific________ ________, opening________ _________, and _____ _____.

A

Replicates, Network ports, Infected email, Inserting a flash-drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ may also be threatened by computer worms, viruses, and other types of malware, such as during the ILOVEYOU incident, or the Storm Worm threat.

A

National Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List four common symptoms of a computer virus infection.

A

Spyware, adware, rootkit, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Any software that covertly gathers user information through the user’s Internet connection without their knowledge, usually for advertising purposes, is______

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Routine_____ results identify hosts that are vulverable to attacks.

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Patching is the process of repairing a/an_____ or a/an_____ that is identified after the release of an application.

A

Vulnerability, Flaw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This training informs users of common pitfalls that can cause system vulnerabilities and what they can do to mitigate them.

A

User Awareness

17
Q

A_____ restrics data communication traffic to and from the network it’s connected to.

18
Q

What device/service provides security, privacy, and web filtering?

A

Proxy Server/Web

19
Q

A mail gateway can be set up to scan and filer out problematic_____, _____, and________.

A

File extension, Viruses, Spam

20
Q

______ can determine weather someone attempted to break into a system and if the intrusion was successful, along with what they may have done.

A

Detection Measures

21
Q

_______ software is your system’s protection against viruses.

22
Q

Anti-virus program inspect the contents of each file, searching for specific patterns that match a malicious profile called a______.

A

Virtual signature

23
Q

Administrators should check logs daily for signs of security compromise. Administrators can check logs from_____, _____, _____, and proxy servers.

A

Firewall, IDSs/IPSs, DNS servers

24
Q

Steps of the response phase of an attack may include tasks such as____, _____, _____, _____, notifying all interested parties (to include legal authorities), and compiling detailed repair reports for the entire affected system.

A

Define the attack, Inform users, Contain the intrusion, Identify the source