CH 2 COVERS OBJ 2.1, 2.3, 3.1, 3.2, 4.2, 4.3 Flashcards

1
Q

WHAT IS A BOTNET

A

GROUP OF COMPROMISED COMPUTERS USUALLY WORKING TOGETHER WITH MALWARE THAT WAS INSTALLED BY A WORM OR A TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AN INDIVIDUAL COMPUTER WITHIN A BOTNET IS REFERRED TO AS WHAT

A

ZOMBIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT IS A VIRUS

A

CODE THAT CAN INFECT A COMPUTER’S FILES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS A HONEYPOT

A

COMPUTER THAT IS USED TO LURE ATTACKERS AND QUARANTINE THEIR ATTACK SO IT CAN BE ANALYZED, AND DOES NOT SPREAD TO THE REST OF THE NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT ARE SOME DRAWBACKS TO USING HIDS INSTEAD OF NIDS

A

HIDS MAY USE A LOT OF RESOURCES, WHICH CAN SLOW SERVER PERFORMANCE AND HIDS CANNOT DETECT NETWORK ATTACKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT ATTACKS CAN HIDS DETECT

A

OPERATING SYSTEM ATTACKS AND WILL HAVE A HIGH LEVEL OF DETECTION FOR THOSE ATTACKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT IS A ZOMBIE

A

SYSTEMS THAT HAVE BEEN COMPROMISED WITHOUT THE KNOWLEDGE OF THE OWNER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT COMPUTER SECURITY THREATS CAN BE UPDATED AUTOMATICALLY AND REMOTELY

A

ZOMBIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HOW DOES YOUR COMPUTER BECOME A ZOMBIE

A

COMPUTER MUST BE CONNECTED TO THE INTERNET SO THAT THE HACKER OR MALICIOUS ATTACK CAN MAKE ITS WAY TO THE COMPUTER AND BE CONTROLLED REMOTELY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT IS THE BEST MODE TO USE WHEN SCANNING FOR VIRUSES

A

SAFE MODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT IS A COMMON SYMPTOM OF SPYWARE

A

POP-UP WINDOWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT ARE COMMON SYMPTOMS OF VIRUSES

A

INFECTED FILES, COMPUTER SHUTS DOWN, APPLICATIONS FREEZE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT ARE TWO WAYS TO SECURE THE COMPUTER WITHIN THE BIOS

A

CONFIGURE A SUPERVISOR PASSWORD AND SET THE HARD DRIVE FIRST IN THE BOOT ORDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DAN IS A NETWORK ADMINISTRATOR. ONE DAY HE NOTICES THAT HIS DHCP SERVER IS FLOODED WITH INFORMATION. HE ANALYZES IT AND FINDS THAT THE INFORMATION IS COMING FORM MORE THAN 50 COMPUTERS ON THE NETWORK. WHICH OF THE FOLLOWING IS THE MOST LIKELY REASON

A

A WORM IS MOSTLY LIKELY THE REASON THAT THE SERVER IS BEING BOMBARDED WITH INFORMATION BY THE CLIENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NAME 3 EXAMPLES OF MALICIOUS SOFTWARE

A

ROOTKITS, SPYWARE, AND VIRUSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT TYPE OF ATTACK USES MORE THAN ONE COMPUTER

A

DDOS-DISTRIBUTED DENIAL OF SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WHAT ARE 2 WAYS IN WHICH YOU CAN STOP EMPLOYEES FROM USING USB FLASH DRIVES

A

DISABLE USB IN BIOS AND DISABLE THE USB ROOT HUB IN THE OPERATING SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NAME 2 BLUETOOTH THREATS

A

BLUESNARFING AND BLUEJACKING

19
Q

WHAT IS A MALICIOUS ATTACK THAT EXECUTES AT THE SAME TIME EVERY WEEK

A

A LOGIC BOMB

20
Q

TIM BELIEVES THAT HIS COMPUTER HAS A WORM. THAT IS THE BEST TOOL TO USE TO REMOVE THAT WORM

A

ANTIVIRUS SOFTWARE

21
Q

ACTIVE INTERCEPTION INCLUDES WHAT

A

A COMPUTER PLACED BETWEEN THE SENDER AND THE RECEIVER TO CAPTURE INFORMATION

22
Q

WHAT TYPE OF SCANNER CAN LOCATE A ROOTKIT ON A COMPUTER

A

MALWARE SCANNER

23
Q

WHAT TYPE OF MALWARE DOES NOT REQUIRE A USER TO EXECUTE A PROGRAM TO DISTRIBUTE THE SOFTWARE

A

WORM

24
Q

WHAT IS A WORM

A

SAME AS A VIRUS BUT IT SELF REPLICATES

25
Q

WHAT IS A ROOTKIT

A

TYPE OF SOFTWARE DESIGNED TO GAIN ADMINISTRATOR LEVEL CONTROL OVER A COMPUTER SYSTEM WITHOUT BEING DETECTED

26
Q

IS HIDS CONSIDER AN INLINE DEVICE

A

NO BECAUSE THEY RUN ON AN INDIVIDUAL COMPUTER

27
Q

NAME 3 INLINE DEVICES

A

FIREWALLS, ROUTERS, AND CSU/DSU

28
Q

WHAT IS BLUEJACKING

A

SENDING OF UNSOLICITED MESSAGES TO BLUETOOTH ENABLED DEVICES SUCH AS MOBILE PHONES

29
Q

WHAT IS BLUESNARFING

A

UNAUTHORIZED ACCESS OF INFORMATION FROM A WIRELESS DEVICE THROUGH A BLUETOOTH CONNECTION

30
Q

WHITELISTING, BLACKLISTING, AND CLOSING OPEN RELAYS ARE ALL MITIGATION TECHNIQUES ADDRESSING WHAT KIND OF THREAT

A

SPAM

31
Q

HOW DO MOST NETWORK VIRUSES SPREAD

A

THROUGH EMAIL

32
Q

WHAT IS THE DIFFERANCE BETWEEN A TROJAN HOUSE AND A WORM

A

A WORMS SELF REPLICATES WITHOUT USER INTERVENTION AND TROJAN HORSES DO NOT SELF REPLICATE

33
Q

WHAT TYPE OF VIRUS HIDES ITS CODE TO MASK ITSELF

A

ARMORED VIRUS

34
Q

NAME THE TYPES OF VIRUSES

A

BOOT SECTOR, MACRO, PROGRAM, POLYMORPHIC, STEALTH, ARMORED, MULTIPARTITE

35
Q

NAME THE TYPES OF VIRUSES

A

BOOT SECTOR, MACRO, PROGRAM, POLYMORPHIC, STEALTH, ARMORED, MULTIPARTITE

36
Q

WHAT TYPE OF MALWARE APPEARS TO THE USER AS LEGITIMATE BUT ACTUALLY ENABLES UNAUTHORIZED ACCESS TO THE USERS COMPUTER

A

TROJAN

37
Q

WHAT WOULD BE CONSIDERED DETRIMENTAL EFFECTS OF A VIRUS

A

TECHNICAL SUPPORT RESOURCES ARE CONSUMED BY INCREASED USER CALLS AND USERS ARE TRICKED INTO CHANGING THE SYSTEM CONFIGURATION

38
Q

TO MITIGATE RISKS WHEN USERS ACCESS COMPANY EMAIL WITH THEIR SMARTPHONE, WHAT SECURITY POLICY SHOULD BE IMPLEMENTED

A

A PASSWORD SHOULD BE SET ON THE SMARTPHONE AND THE PHONE SHOULD LOCK AFTER A CERTAIN TIME PERIOD

39
Q

YOUR MANAGER WANTS YOU TO IMPLEMENT A TYPE OF INTRUSION DETECTION SYSTEM (IDS) THAT CAN BE MATCHED TO CERTAIN TYPES OF TRAFFIC PATTERNS. WHAT KIND OF IDS IS THIS

A

SIGNATURE BASED IDS

40
Q

YOU ARE THE SECURITY ADMINISTRATOR FOR YOUR ORGANIZATION. YOU WANT TO ENSURE THE CONFIDENTIALITY OF DATA ON MOBILE DEVICES. WHAT IS THE BEST SOLUTION?

A

DEVICE ENCRYPTION IS THE BEST SOLUTION TO PROTECT THE CONFIDENTIALITY OF DATA.

41
Q

YOU ARE TASK WITH IMPLEMENTING A SOLUTION THAT ENCRYPTS THE CEO’S LAPTOP. HOWEVER YOU AR NOT ALLOWED TO PURCHASE ADDITIONAL HARDWARE OR SOFTWARE. WHICH OF THE FOLLOWING SOLUTIONS SHOULD YOU IMPLEMENT

A

TPM OR TRUSTED PLATFORM MODULE IS A CHIP THAT RESIDES ON THE MOTHERBOARD OF THE LAPTOP. IT GENERATE CRYPTOGRAPHIC KEYS THAT ALLOW THE ENTIRE DISK TO BE ENCRYPTED AS IN FULL DISK ENCRYPTION

42
Q

ONE OF YOUR CO-WORKERS COMPLAINS OF VERY SLOW SYSTEM PERFORMANCE AND SAYS THAT A LOT OF ANTIVIRUS MESSAGES ARE BEING DISPLAYED. THE USER ADMITS TO RECENTLY INSTALLING PIRATED SOFTWARE AND DOWNLOADING AND INSTALLING AN ILLEGAL KEYGEN TO ACTIVATE THE SOFTWARE. WHAT TYPE OF MALWARE HAS AFFECTED THE USER’S COMPUTER

A

A TROJAN WAS PROBABLY INSTALLED AS PART OF THE KEYGEN PACKAGE

43
Q

A SMARTPHONE HAS BEEN LOST. YOU NEED TO ENSURE 100% THAT NO DATA CAN BE RETRIEVED FROM IT. WHAT SHOULD YOU DO?

A

REMOTE WIPE