Module 17 Flashcards
When logging off a browser on an office computer or with my personal computer if connected to free/open network what should i do?
Clear the cache
The _________ is one of the most well-exploited vectors for infecting a system with malware or stealing information.
web browser
what does vector mean
the methods and pathways that attacks use to gain unauthorized access to systems, networks, or application.
__________ is malicious software threats and tools designed to vandalize or compromise computer systems.
Malware
Name four forms that malware can appear.
- Viruses and worms
- Trojan horse
- Adware
- Spyware
What do you call malware designed to spread to other PCs?
Viruses and worms
What do you call an apparently legitimate application that conceals malicious functions, such as spyware or a bot allowing remote control of the PC?
Trojan horse
SubSeven RAT management console. What does RAT stand for?
Remote Trojan horse
This console allows users to control a computer system from a remote location.
What do you call software or configuration files installed with your agreement that helps a company track what pages you visited and display personalized adverts to you?
Adware
What do you call malware installed covertly, possibly as a Trojan or as a result of a worm or virus infection, that tries to track everything you use the computer for. Spyware might record keystrokes, take screenshots of the desktop, or even hack the computer’s camera and microphone.
Spyware
Why is it important to use the latest browser software versions?
Legacy browsers are more likely to be susceptible to malware.
Are adware and symptoms designed with intent to vandalize the computer system?
No, it’s designed with commercial or criminal intent, but not to destroy the computer system.
Why is it difficulty to know whether a computer is infected?
The malware is designed to be hidden. It won’t destroy the computer system, because it’s instead designed to steal information.
What two types of malware may spawn pop-ups without the user opening the browser?
Viruses and Trojans
Name five obvious symptoms that you computer system is infected by spyware or adware.
- additional toolbars
- home page or search results changing suddenly
- searches returning different results from other PCs
- slow performance
- excessive crashing (faults)
- redirection
If I try to open a web page and another opens up, what would I call this symptom? It may imitate the targeted page.
redirection
Redirection attacks often attack __________.
Internet search engines
Why would a hacker use adware redirection?
Simply to drive traffic through a site.
Why would a hacker user spyware redirection?
To capture authentication details
Malware may be able to infect your computer because OS or browser software is not up to date and is therefore vulnerable to some sort of exploit. What is the only way to mitigate this type of threat?
By installing the latest software patches.
You should also configure browser settings to ensure you are using the best safe browsing practices.
What does CSS stand for?
Cascading style sheets
HTTP is a limited protocol in terms of serving any content other than text and pictures. Many websites use active content to play video or add animated and interactive features. There are four ways of creating this type of content. Name them.
- Scripting
- Add-ons
- Flash/Silverlight
- Java
__________ can run either on the server or on the client (browser) to perform quite sophisticated actions. __________ is usually based on JavaScript. JavaScript can also be used to create browser add-ons.
Scripting
__________ are two rival development environments, created by Adobe and Microsoft respectively, used to provide interactive web applications and video. The browser must have the __________ or ___________ plug-in installed to view this type of content.
Flash/Silverlight