Block 5 Unit1 C Flashcards
(24 cards)
Malicious code is______ or ______ ______ written to intentionally cause undesired effects, security breaches or damage to a system
Malware, Websites scripts
____ is software designed to infiltrate or damage a computer system without the owner’s informed consent.
Malware
Malware’s most common pathways from criminals to users is though what two methods?
Email, World Wide Web
Viruses are written by people with intent to do what?
Harm
Viruses are classified into many categories, based on how they____ and the nature of their____.
Propagate, Behavior
A Boot-Sector Virus resides where?
Boot-Sector
A Boot Sector Virus executes when the computer is
Booted
A file Infector Virus are also known as a/an____ Virus or_____ Virus, and they operate in memory and infect______ files.
Executable, Parasitic, Executable
This type of virus is planted on the system by installing a piece of software that contains some code that will not execute until a certain event occurs.
Logic Bomb
Worms are scary because it has the unique characteristics of being able to_____ itself without needing a user to activate the virus. Worms can replicate themselves in several ways, such as through specific________ ________, opening________ _________, and _____ _____.
Replicates, Network ports, Infected email, Inserting a flash-drive
______ may also be threatened by computer worms, viruses, and other types of malware, such as during the ILOVEYOU incident, or the Storm Worm threat.
National Security
List four common symptoms of a computer virus infection.
Spyware, adware, rootkit, ransomware
Any software that covertly gathers user information through the user’s Internet connection without their knowledge, usually for advertising purposes, is______
Adware
Routine_____ results identify hosts that are vulverable to attacks.
Scanning
Software Patching is the process of repairing a/an_____ or a/an_____ that is identified after the release of an application.
Vulnerability, Flaw
This training informs users of common pitfalls that can cause system vulnerabilities and what they can do to mitigate them.
User Awareness
A_____ restrics data communication traffic to and from the network it’s connected to.
Firewall
What device/service provides security, privacy, and web filtering?
Proxy Server/Web
A mail gateway can be set up to scan and filer out problematic_____, _____, and________.
File extension, Viruses, Spam
______ can determine weather someone attempted to break into a system and if the intrusion was successful, along with what they may have done.
Detection Measures
_______ software is your system’s protection against viruses.
Anti-virus
Anti-virus program inspect the contents of each file, searching for specific patterns that match a malicious profile called a______.
Virtual signature
Administrators should check logs daily for signs of security compromise. Administrators can check logs from_____, _____, _____, and proxy servers.
Firewall, IDSs/IPSs, DNS servers
Steps of the response phase of an attack may include tasks such as____, _____, _____, _____, notifying all interested parties (to include legal authorities), and compiling detailed repair reports for the entire affected system.
Define the attack, Inform users, Contain the intrusion, Identify the source