Chapter 9 Flashcards

1
Q

Software Exploitation

A

Attacks launched against applications and higher-level services. Includes gaining access to data using weaknesses
300

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rootkits

A

Software programs that have the ability to hide certain things from the operating system. Not all of the processes may show up in Task Manager
301

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bad extensions to download in an email

A
.bat
.com
.exe
.hlp
.pif
.scr
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

Takes control of the system and demands that a third party be paid. Often gains control via encrypting the hard drive or changing passwords
309

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

Malicious software running on a zombie computer. Generally run in the background of your computer with no visible evidence of their presence
309

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Means of spreading Viruses

A
  • On contaminated media (DVD, USB)
  • Through email and social networking sites
  • As part of another program
    310
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Polymorphic Virus

A

Change their form to avoid detection

310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stealth Virus

A

Avoid detection by masking themselves from applications. They usually hide at the end of a boot section
310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Retroviruses

A

Attack or bypass the antivirus software installed on a computer
310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multipartite Virus

A

Attack your system in multiple ways

310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Armored Virus

A

Designed to make itself difficult to detect or analyze

310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Companion Virus

A

Attaches itself to legitimate programs and then creates a program with a different filename extension
310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phage Virus

A

Modifies and alters programs in databases

310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Macro Virus

A

Exploits enhansements made to many application programs, which are used by programmers to expand the capability of applications
310

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Symptoms of Viruses

A

Programs take longer to load
Unusual files appear on your hard drive
Program sizes change
Software exhibits unusual characteristics
System mysteriously shuts down or unexpected disk activity
Suddenly can access disk drive or other system resources
System will not reboot or gives unexpected error messages during startup
311

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SPIM

A

SPAM over instant messaging

316

17
Q

SPIT

A

SPAM over Internet Telephony

316

18
Q

Places to use antivirus software in a layered approach

A

Gateways, servers, and at the desktop

317

19
Q

XMAS Attack

A

aka christmas tree attack.

Uses Nmap to scan for open ports using three flags (FIN PSH and URG)
324

20
Q

Birthday Attack

A

If a key is hashed, the possibility that given enough time another value can be created with the same hash value
327

21
Q

Dictionary Attack

A

uses a dictionary of common words to try to guess passwords. Usually automated
327

22
Q

Rainbow Table Attack

A

Focuses on identifying a stored value by using values in the existing table of hashed phrases or words. Once it creates hashes, it compares them against encrypted values and continues until it breaks encryption
327

23
Q

Privilege Escalation

A

A user gaining more privileges that he/she should have. With the escalated permissions the user can perform task that he/she should not be allowed to do.
328

24
Q

Client side attack

A

targets vulnerabilities in client applications that interact with a malicious server. A user accesses the trusted site and unwittingly downloads the rogue code allows the attacker to install and execute malware
333

25
Q

Malicious Insider Threat

A

When a disgruntled employee sells company information

332

26
Q

Typo Squatting

A

AKA URL Hijacking

registering domains that are similar to those of a known entity but based on a misspelling or typographical error.

333

27
Q

Watering Hole Attack

A

An attacker infects a common site and lets the users infect themselves

334

28
Q

Cross-Site Scripting

A

Using a client-side scripting language an attacker can trick a user who visits a site into having code execute locally
334

29
Q

XSRF

A

Cross-Site Request Forgery

unauthorized commands coming from a trusted user to the website.
335