IAS MT Flashcards

(80 cards)

1
Q

It stands for “Malicious Software”

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

it is designed to gain
access or installed into the computer without the consent of the user.

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

They
perform unwanted tasks in the host computer for the benefit of a third party.

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

simply written to distract/annoy the user, to the complex ones which
captures the sensitive data from the host machine and send it to remote
servers.

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is a special type of malware which is used for forced advertising.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

They either redirect the page to some advertising page or pop-up an additional page which promotes some product or event.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are financially supported by
the organizations whose products are advertised.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There is some malicious software which are downloaded along with the free software offered over the internet and installed in the host computer without the
knowledge of the user.

A

Browser Hijacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This software modifies the browsers setting and redirect
links to other unintentional sites.

A

Browser Hijacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a special type malware of which is installed in the target computer with or without the user permission and is designed to steal sensitive information from the target machine.

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mostly it gathers the browsing habits of the user and the send it to the remote server without the knowledge of the owner of the computer. Most of the time they are downloaded in to the host computer while downloading freeware i.e. free application programs from the internet.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

may be of various types; It can keeps track of the cookies
of the host computer, it can act as a keyloggers to sniff the banking
passwords and sensitive information, etc.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a malicious code written to damage/harm the host computer by deleting or appending a file, occupy memory space of the computer by replicating the copy of the code, slow down the performance of the computer, format the host machine, etc. It can be spread via email attachment, pen drives, digital images, e-greeting, audio or video clips,
etc.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

may be present in a computer but it cannot activate itself
without the human intervention. Until and unless the executable file(.exe)
is execute, cannot be activated in the host machine.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

They are a class of virus which can replicate themselves.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

They are different from the virus by the fact that they does not require human intervention to travel over the network and spread from the infected machine to the whole network.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

can spread either through network, using the loopholes of the Operating System or via email. The replication and spreading of the this over the network consumes the network resources like space and bandwidth and force the network to chok

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is a malicious code that is installed in the host machine
by pretending to be useful software.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The user clicks on the link or download the file which pretends to be a useful file or software from legitimate source. It not only damages the host computer by manipulating the data but also it
creates a backdoor in the host computer so that it could be controlled by a remote computer.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a network of computers which are infected by malicious code and controlled by central controller.

A

Botnet(robot network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The computers of this network which are infected by malicious
code are known as

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

are networks of hijacked computer devices used to
carry out various scams and cyberattacks.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The term “botnet” is
formed from the word’s

A

Robot and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

serve as a tool to automate mass attacks, such as data theft,
server crashing, and malware distribution.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
It holds the host computer hostage until the ransom is paid. The malicious code can neither be uninstalled nor can the computer be used till the ransom is paid.
Scareware
26
When was the internet born?
Around 1960's
27
When was the the trend changed from causing the physical damaging to computers to making a computer malfunction using a malicious code
Around 1980's
28
This term is used to describe a unlawful activity in which computer or computing devices such as smartphones, tablets, Personal Digital Assistants(PDAs), etc. which are stand alone or a part of a network are used as a tool or/and target of criminal activity.
Cyber Crime
29
It is often committed by the people of destructive and criminal mindset either for revenge, greed or adventure.
Cyber Crime
30
An attack to the network or the computer system by some person with authorized system access is known as?
Insider attack
31
It is generally performed by dissatisfied or unhappy inside employees or contractors.
Insider attack
32
The insider attack could be prevented by planning and installing an?
internal intrusion detection systems (IDS)
33
When the attacker is either hired by an insider or an external entity to the organization
External attacker
34
These attacks are generally performed by amateurs who don’t have any predefined motives to perform the cyber attack. Usually these amateurs try to test a tool readily available over the internet on the network of a random company.
Unstructured attack
35
These types of attacks are performed by highly skilled and experienced people and the motives of these attacks are clear in their mind. They have access to sophisticated tools and technologies to gain access to other networks without being noticed by their Intrusion Detection Systems(IDSs).
Structure attack
36
these attacker have the necessary expertise to develop or modify the existing tools to satisfy their purpose.
Structured attacker
37
These types of attacks are usually performed by professional criminals, by a country on other rival countries, politicians to damage the image of the rival person or the country, terrorists, rival companies, etc.
Structured attacker
38
6 reasons for commission of cyber crimes
Money Revenge Fun Recognition Anonymity Cyber Espionage
39
One of the six reasons for commission of cyber crimes, It is considered to be pride if someone hack the highly secured networks like defense sites or networks.
Recognition
40
One of the six reasons for commission for cyber crime, At times the government itself is involved in cyber trespassing to keep eye on other person/network/country. The reason could be politically, economically socially motivated.
Cyber Espionage
41
19 kinds of cyber crime
Cyber stalking Child pornography Forgery and counterfeiting Software piracy and crime related to IPRs Cyber Terrorism Phishing Computer vandalism Computer hacking Creating and distributing viruses over internet Spamming Cross site scripting Online auction fraud Cyber squatting Logic bombs Web jacking Internet time thefts Denial of service attack Salami attack Data diddling Email spoofing
42
It is a process of changing the header information of an e-mail so that its original source is not identified and it appears to an individual at the receiving end that the email has been originated from source other than the original source
Email spoofing
43
It is a practice of changing the data before its entry into the computer system. Often, the original data is retained after the execution on the data is done.
Data diddling
44
It is an attack which proceeds with small increments and final add up to lead to a major attack. The increments are so small that they remain unnoticed
Salami attack
45
It is a cyber attack in which the network is chocked and often collapsed by flooding it with useless traffic and thus preventing the legitimate network traffic
Denial of service attack
46
Hacking the username and password of ISP of an individual and surfing the internet at his cost is?
Internet time Theft
47
The hacker gain access to a website of an organization and either blocks it or modify it to serve political, economical or social interest.
Web jacking
48
These are malicious code inserted into legitimate software. The malicious action is triggered by some specific condition. If the conditions holds true in future, the malicious action begins and based on the action defined in the malicious code, they either destroy the information stored in the system or make system unusable.
Logic bombs
49
It is an act of reserving the domain names of someone else‟s trademark with intent to sell it afterwards to the organization who is the owner of the trademark at a higher price.
Cyber Squatting
50
There are many genuine websites who offers online auction over internet. Taking the advantage of the reputation of these websites, some of the cyber criminals lure the customers to online auction fraud schemes which often lead to either overpayment of the product or the item is never delivered once the payment is made.
Online auction fraud
51
It is an activity which involves injecting a malicious client side script into a trusted website. As soon as the browser executes the malicious script, the malicious script gets access to the cookies and other sensitive information and sent to remote servers. Now this information can be used to gain financial benefit or physical access to a system for personal interes
Cross site scripting
52
Sending of unsolicited and commercial bulk message over the internet is known as
Spamming
53
3 criterias that an email cab be classified as spam
Mass mailing Anonymity Unsolicited
54
One of the criteria in spamming, the email is not targeted to one particular person but to a large number of peoples.
Mass mailing
55
One of the criteria in spamming, The real identify of the person not known
Anonymity
56
One of the criteria in spamming, the email is neither expected nor requested for the recipient.
Unsolicited
57
The spreading of a virus can cause business and financial loss to an organization. The loss includes the cost of repairing the system, cost associated with the loss of business during downtime and cost of loss of opportunity. The organization can sue the hacker, if found, for the sum of more than or equivalent to the loss borne by the organization.
Creating and distributing viruses over internet
58
One of the classification of hackers,someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed.
Blue Hat
59
One of the classification of hackers, find out the security vulnerabilities and report to the site administrators and offer the fix of the security bug for a consultancy fee.
Grey Hat
60
One if the classification of hackers, They may hack the system for social, political or economically motivated intentions. They find the security loopholes the system, and keep the information themselves and exploit the system for personal or organizational benefits till organization whose system is compromised is aware of this, and apply security patches.
Black hat
61
One of the classification of hackers and also known as the crackers
Black hat
62
One of the classification of hackerd, are the persons who hack the system to find the security vulnerabilities of a system and notify to the organizations so that a preventive action can be taken to protect the system from outside hackers
White hat
63
They are also known as ethical hackers
White hat
64
It is a practice of modifying computer hardware and software to accomplish a goal outside the creator‟s original purpose.
Computer hacking
65
t is an act of physical destroying computing resources using physical force or malicious code.
Computer vandalism
66
It is a process of acquiring personal and sensitive information of an individual via email by disguising as a trustworthy entity in an electronic communication.
Phishing
67
The purpose of this is identity theft and the personal information like username, password, and credit card number etc. may be used to steal money from user accoun
Phishing
68
It is defined as the use of computer resources to intimidate or coerce government, the civilian population or any segment thereof in furtherance of political or social objectives.
Cyber Terrorism
69
is an illegal reproduction and distribution for personal use or business. It comes under crime related to IPR infringement. Some of the other crimes under IPR infringement are: download of songs, downloading movies, etc.
Software piracy snd Crime related to IPRS
70
It is an act of possessing image or video of a minor (under 18), engaged in sexual conduct.
Child pornography
71
It is an act of stalking, harassing or threatening someone using Internet/computer as a medium. This is often done to defame a person and use email, social network, instant messenger, web-posting, etc. as a using Internet as a medium as it offers anonymity. The behaviour includes false accusations, threats, sexual exploitation to minors, monitoring, etc.
Cyber stalking
72
With the advancement in the hardware and the software, it is possible to produce counterfeit which matches the original document
Forgery and counterfeiting
73
it acts as a fundamental system in case of a mishap where data is inadvertently lost or corrupted from original system
Backup System
73
where data is backed up on a full-scale and recovered back from the same
full back up
73
where only changed or newly added data is backed up subsequently after the last full or incremental backup.
Incremental Backup
73
where only changed or newly added data is backed up subsequently after last full or differential backup but changes made in the previous differential backup are updated in next differential backup
differential back up
73
Methods in an enterprise can be improved based ono performance metrics, is measured in terms of cost for infrastructure, operations and maintenance.
Total Cost of ownership
74
AOB stands for?
Age of Backup
75
RTO stands for?
Recovery time objective
76
RPO stands for?
Recovery Point Objective