cyber security 2016 SLC Flashcards
(100 cards)
What type of convert attack uses devices or computer programs that captures anything the user types or anything the user clicks with a mouse?
A . Keylogger
Spoofing is the act of falsely identifying a packet’s IP address, MAC address, etWhich of the below are three types of Spoofing?
A) ARP Poisoning, Web Spoofing, and DNS Spoofing
B) Web Spoofing, DNS Spoofing, and Relay Spoofing
C) Web Spoofing, ARP Poisoning, and Relay Spoofing
D) DNS Spoofing, Relay Spoofing, and ARP Poisoning
A) ARP Poisoning, Web Spoofing, and DNS Spoofing
This refers to applications or files that are not classified as viruses or Trojan Horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization. This is done by performing a variety of undesired actions such as irritating users with pop-up windows, tracking user habits, and unnecessarily exposing computer vulnerabilities to attack.
C) Grayware
Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. What are three methods antivirus software use to identify malware?
D) Signature-Based Detection, Heuristic-Based Detection, File Emulation
Cloud-computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. What is the primary function of cloud antivirus technology?
C) A technology that uses lightweight agent software on the protected computer, while offloading the majority of data analysis to the provider’s infrastructure.
Your regular bills and account statements do not arrive on time, you never receive bills or collection notices for products or services, or you receive calls from debt collectors about debts that do not belong to you are examples of:
C) Red Flags of Identity Theft
What type of Trojan Horses send a copy of itself to all recipients in a user’s address book, which causes an outbreak by passing throughout a network?
D) Droppers
What is considered the first piece of malicious software to have caused significant damage on the Internet?
B) Morris worm
A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware that gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload. What do Trojans install that create a hidden opening allowing access to a system?
A) Backdoor
A computer virus is a type of malware that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector. When this replication succeeds, the affected areas are then said to be infected. This type of virus spreads by infecting USB disks or hard drive disks. The virus is loaded into memory and attempts to infect any and all disks inserted into the computer.
C) Boot Sector
Which one of the following is a network attack where the attacker creates an ICMP packet that’s larger than the maximum allowed size of 65,535 bytes?
C) Ping of Death
12) Which one of the following is a form of social engineering where an unauthorized person follows closely behind an authorized person into a restricted area?
A) piggybacking
13) Computer software, or just software, is any set of machine-readable instructions that directs a computer’s processor to perform specific operations. Changes and improvements to software happen. What is a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable bundle because installing is easier and less error-prone?
A) Service Pack
14) This must be regularly updated by a computer’s anti-virus program and is used to identify potential malicious software?
C) signature file
Which class of brute-force mathematical attack exploits mathematical weaknesses of hash algorithms and one-way hash functions?
C) Birthday Attack
Many legislative Acts affect computer security. Which Act changed computer crime damage assessments, increasing the number of crimes violating federal law?
C) The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (Patriot Act)
TCP/IP provides end-to-end connectivity, specifying how data should be formatted, addressed, transmitted, routed, and received at the destination. The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model groups similar communication functions into one of seven logical layers. Which four of the seven layers does TCP/IP operate?
C) Application, Transport, Network, Data Link
18) Which is a set of protocols developed to support the secure exchange of packets and is required in IPv6?
D) IPsec
19) How do organizations classify information such as client lists, product designs, and organizational strategies?
B) sensitive
20) Risk is comprised of what two components?
C) Vulnerability and Threat
21) A security database that contains entries for users and their access rights for files and folders is known as?
B) an access control list (ACL)
22) The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model groups similar communication functions into one of seven logical layers. This hardware device operates at the data link layer of the OSI model and can limit hostile sniffing on a LAN (Local Area Network)?
A) Ethernet Switch
23) The purpose of classification is to protect information from being used to damage or endanger national security, research and development, or proprietary information. How do organizations classify information such as client lists, product designs, and organizational strategies?
A) sensitive
24) What can an intruder place between two endpoints to capture an entire session?
B) sniffers