LP - Malware Flashcards

(14 cards)

1
Q

What does Nessus software do?

A

Vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Virus attaches itself to what

A

file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms do not have to be attached to a file and can

A

scan for vulnerable hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does DKIM do?

A

Ensures messages have not been tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does DMARC do?

A

Enacts responses to messages deemed untrustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does SPF do?

A

Checks if the email came fro the correct DNS domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EDR stands for

A

Endpoint detection and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Kali Linux command is used to clone a site in an attempt to harvest user credentials?

A

setoolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a SYN flood attack is also what type of attack?

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CI/CD stands for

A

Continuous Integration and Continuous Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COBIT stands for

A

Control Objectives for Information and Related Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TOGAF stands for

A

The Open Group Architecture Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ITIL stands for

A

Information Technology Infracture Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COBIT Compliance Maturity Levels

A

0: Non-existent
1: Initial
2: Repeatable
3: Defined Processes
4: Managed and Measurable
5: Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly