Module 17 Flashcards

1
Q

When logging off a browser on an office computer or with my personal computer if connected to free/open network what should i do?

A

Clear the cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _________ is one of the most well-exploited vectors for infecting a system with malware or stealing information.

A

web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does vector mean

A

the methods and pathways that attacks use to gain unauthorized access to systems, networks, or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ is malicious software threats and tools designed to vandalize or compromise computer systems.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name four forms that malware can appear.

A
  1. Viruses and worms
  2. Trojan horse
  3. Adware
  4. Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you call malware designed to spread to other PCs?

A

Viruses and worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you call an apparently legitimate application that conceals malicious functions, such as spyware or a bot allowing remote control of the PC?

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SubSeven RAT management console. What does RAT stand for?

A

Remote Trojan horse
This console allows users to control a computer system from a remote location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do you call software or configuration files installed with your agreement that helps a company track what pages you visited and display personalized adverts to you?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you call malware installed covertly, possibly as a Trojan or as a result of a worm or virus infection, that tries to track everything you use the computer for. Spyware might record keystrokes, take screenshots of the desktop, or even hack the computer’s camera and microphone.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is it important to use the latest browser software versions?

A

Legacy browsers are more likely to be susceptible to malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Are adware and symptoms designed with intent to vandalize the computer system?

A

No, it’s designed with commercial or criminal intent, but not to destroy the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is it difficulty to know whether a computer is infected?

A

The malware is designed to be hidden. It won’t destroy the computer system, because it’s instead designed to steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two types of malware may spawn pop-ups without the user opening the browser?

A

Viruses and Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name five obvious symptoms that you computer system is infected by spyware or adware.

A
  1. additional toolbars
  2. home page or search results changing suddenly
  3. searches returning different results from other PCs
  4. slow performance
  5. excessive crashing (faults)
  6. redirection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If I try to open a web page and another opens up, what would I call this symptom? It may imitate the targeted page.

A

redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Redirection attacks often attack __________.

A

Internet search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why would a hacker use adware redirection?

A

Simply to drive traffic through a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why would a hacker user spyware redirection?

A

To capture authentication details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malware may be able to infect your computer because OS or browser software is not up to date and is therefore vulnerable to some sort of exploit. What is the only way to mitigate this type of threat?

A

By installing the latest software patches.

You should also configure browser settings to ensure you are using the best safe browsing practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does CSS stand for?

A

Cascading style sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HTTP is a limited protocol in terms of serving any content other than text and pictures. Many websites use active content to play video or add animated and interactive features. There are four ways of creating this type of content. Name them.

A
  1. Scripting
  2. Add-ons
  3. Flash/Silverlight
  4. Java
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__________ can run either on the server or on the client (browser) to perform quite sophisticated actions. __________ is usually based on JavaScript. JavaScript can also be used to create browser add-ons.

A

Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

__________ are two rival development environments, created by Adobe and Microsoft respectively, used to provide interactive web applications and video. The browser must have the __________ or ___________ plug-in installed to view this type of content.

A

Flash/Silverlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Animated or interactive content often uses a browser __________. these are mini applications that work within the browser. There are many different __________, each working with a different type of content. __________ can also be used to extend or change the functionality of the browser by adding a custom toolbar for instance.
add-ons
26
__________ unlike JavaScript, this is a fully-featured programming language used to develop sophisticated web applications. __________ applications require the Java Virtual Machine to be installed on Windows and for the Java plug-in to be enabled in the browser
Java
27
What does 'server-side scripting' mean?
The code runs on the server to display the web page.
28
Can server-side scripting be disabled?
no
29
What does client-side scripting mean?
The code is placed in the page itself and runs within the browser to display the web page.
30
Name three types of add-ons
1. Extensions 2. Plug-ins 3. Themes
31
Which type of add-on can add functionality to the browser. They might install a toolbar or change menu options. They can run scripts to interact with the pages you are looking at.
Extensions
32
What type of add-on is designed to play some sort of content embedded in a web page, such as Flash, Silverlight, or other video/multimedia format. They can only interact with the multimedia object placed on the page, so it's more limited than an extension.
Plug-ins
33
Which type of add-on changes the appearance of the browser using custom images and color schemes.
Themes
34
How can you view installed add-ons and choose to remove or enable/disable them?
By using the browser settings button or menu.
35
What's a cookie?
A cookie is a plain text file created by a website when you visit it. The purpose of cookies is to store session information so that the website can be personalized for you.
36
An IP address can be quite closely tied to what?
A geographical location.
37
What are the two classes of cookies?
first party cookies third party cookies
38
Which class of cookie is set by the domain you visit.
first party
39
Which class of cookie is set by another domain?
third party
40
Can cookies spread malware?
No, but if there is a virus or a Trojan, it may be able to steal the information contained within the cookie.
41
Do cookies have a self-delete date?
Yes, but sometimes the date is set in the very distant future.
42
What's a pop-up?
A sub-window that appears over the main window.
43
Pop-ups can be implemented using __________ or ___________.
Scripts add-ons
44
How to go incognito mode in google chrome?
CTRL+SHIFT+N
45
How to use incognito mode on Firefox?
CTRL+SHIFT+P
46
When a web browser communicates with a secure (HTTPS) server, it accepts the server's __________ to use its public key to encrypt communications.
digital certificate
47
What does PKI stand for?
Public Key Infrastructure
48
What does CA stand for?
Certificate Authority
49
What represents the commercial CAs that grant certificates to most of the companies that do business on the web.
root certificates
50
If the certificate is highly trusted the address bar is colored _________.
green
51
If the certificate is untrusted or otherwise invalid, the address bar is colored __________ and the site is blocked by a warning message.
maroon
52
What restricts access to a computer or network to a defined list of hosts and applications?
firewall
53
Basic __________ work on the basis of filtering network data packets as they try to pass into or out of the machine.
packet filtering firewall
54
On a TCP/IP network, each host is identified by an IP address, while each application protocol (HTTP, FTP, SMTP, and so on) is identified by a __________.
portal number
55
What two things can a packet firewall be applied to?
1. IP address 2. port number
56
This type of firewall is more advanced and can analyze the contents of network data packets, so long as they are not encrypted, and block them if any suspicious signatures are detected and identify suspicious patterns of activity.
Stateful inspection
57
A __________ firewall is a dedicated appliance with the firewall installed as firmware.
hardware
58
A __________ firewall is installed as an application on a workstation or server.
software
59
Most __________ feature a built-in firewall, configured via the web management interface.
Internet routers
60
A __________ may be installed on a client PC to protect it.
simple host firewall
61
What's another name for simple host firewall?
personal firewall
62
What is enabled on all network connections by default unless it has been replaced by a third-party firewall?
Windows Defender Firewall
63
Why isn't it a good idea to run two host firewalls at the same time?
They would conflict with each other and be very difficult to configure and troubleshoot.
64
If I want to configure my firewall what is the path I'd have to take to access it?
Windows Defender Security Center > Firewall & network protection.
65
What link lets you configure applications that are allowed to accept incoming Internet connections?
Allow an app or feature
66
On an enterprise network, a network firewall is likely to be deployed to monitor and control all traffic passing between the local network and the Internet. On networks like this, clients might not be allowed to connect to the Internet directly but forced to use a ___________ instead.
proxy server
67
A proxy server can be configured as a _________ and apply other types of content filtering rules.
firewall
68
Some proxy servers work __________ so that clients use them without any extra configuration of the client applications. Other proxies require that client software, such as the browser, be configured with the __________ and port of the proxy server. (This information would be provided by __________).
transparently IP address network administrator