module 21 Flashcards

1
Q

What refers to a set of policies that make mobile and workstation computers and network appliances more secure?

A

hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some options for hardening mobile devices, configuring a screen lock out and encrypting data for instance, were discussed earlier. Some other typical hardening policies are as follows: (there are six)

A
  1. anti-virus/anti-malware
  2. patching/updates
  3. enabling passwords
  4. default/weak passwords
  5. disabling unused features
  6. removing unwanted/unnecessary software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you call software that aims to damage a computer or steal information from it?

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This type of hardening option detects the presence of malware and prevent it from running.

What is it?

A

anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an interchangeable name for anit-malware?

A

anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ __________ means the range of things that an attacker could possibly exploit in order to compromise the device.

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

New computers ship with a large amount of pre-installed software, often referred to as __________.

A

bloatware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OS files, driver software, and firmware may be exploitable by malware in the same way as applications software. Besides anti-malware, what else needs to be done?

A

I need to install the latest updates/patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer viruses are programs designed to replicate and spread amongst computers. Viruses are classified by the different ways they can infect the computer. Give three examples:

A
  1. program viruses
  2. macro viruses
  3. worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Of the three types of viruses, which is being described below?

These viruses affect Microsoft Office documents exploiting the macro programming language Visual Basic for Applications (VBA) used to automate tasks.

A

macro viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does VBA stand for?

A

Visual Basics Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Of the three types of viruses, which is being described below?

These are sequences of code that insert themselves into another executable program or script. When the application is executed, the virus code becomes active.

A

program viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Of the three types of viruses, which is being described below?

Memory-resident viruses that replicate over network resources, such as email, by exploiting faults in software programs.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name four things that a viruses “payload” might be programmed to do.

A
  1. display silly messages
  2. corrupt or delete documents
  3. damage system files
  4. install some sort of spyware to snoop on the user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term refers to the act of impersonation or disguising the true source of information.

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Most viruses must be activated by the __________ and thus need some means to trick the user into opening the infected file.

17
Q

Jim’s computer is infected with a virus and has Alan’s email address in his address book. When Sue gets an infected email apparently sent by Alan, it is the virus on Jim’s computer that has sent the message.

What is this an example of?

18
Q

Viruses can also use application exploits to replicate without user intervention, in some circumstances. The most common scenario is for the malware to be uploaded to a compromised website and to try to trigger exploits in the clients visiting the site via vulnerabilities in the OS, the web browser, or web browser plug-in.

What is this referred to as?

A

drive-by-download

19
Q

Other types of malware are not classed as viruses as they do not necessarily try to make copies of themselves. They represent an even greater security threat than viruses however.

What are they called?

A

Trojan Horse or Trojan

20
Q

A web pop-up claims to have detected viruses on the computer and prompts the user to initiate a full scan which installs the attacker’s Trojan.

What is this called?

21
Q

What’s an interchangeable term for scareware?

22
Q

Many Trojans function as __________ applications.

23
Q

What do you call a program that monitors user activity and sends the information to someone else?

24
Q

Type of malware that tries to extort money from the victim.

A

Ransomware

25
Three ways a person running a ransomware scan could ask for payment in order to not be traced?
wire transfer bitcoin premium rate phone lines
26
The route by which malware infects a computer is called the __________.
vector
27
Software that can detect malware and prevent it from executing is called?
anti-virus
28
The anti-viruses primary means of detecting viruses is to use a database of known virus patterns, called __________, __________, or __________.
definitions signatures patterns
29
The primary means of detection is to use a database of known virus patterns, called definitions, signatures, or patterns. Another technique is to use __________ identification.
heuristic
30
What term means that the software uses knowledge of the sort of things that viruses do to try to spot (and block) virus-like behavior
heuristic
31
Security software tends to come as either __________ security suits, designed to protect against a single host, or __________ security suites, designed to be centrally managed from a server console.
personal network
32
This reduces performance somewhat but is essential to maintaining effective protection against malware. And almost all security software is now configured to scan it. What is it?
on-access
33
This might be configured to inspect more file types than on-access scanning. As this can impact performance, such scans are best run when the computer is not being used intensively. What is it?
whole computer scanning
34
Malware such as worms propagate over networks. So, what should be the first action if infected with a worm?
disconnect from the network link
35