Threats, Attacks, and Vulnerabilities (Ch.9) Flashcards

(52 cards)

1
Q

Protocol used to map known IP addresses to unknown physical addresses.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attack that convinces the network that the attacker’s MAC (Media Access Control) address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s address.

A

Address Resolution Protocol (ARP) poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software that gathers information to pass on to marketers or that intercepts personal data such as credit card numbers and makes it available to third parties.

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software that identifies the presence of a virus and is capable of removing or quarantining the virus.

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A virus that is protected in a way that makes disassembling it difficult. The difficulty makes it “armored” against antivirus programs that have trouble getting to, and understanding, its code.

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any unauthorized intrusion into the normal operations of a computer or computer network.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage.

A

attack surface reduction (ASR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An opening left in a program application (usually by the developer) that allows additional access to data.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An automated software program that collects information on the web. usually a compromised computer being controlled remotely.

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of denial-of-service (DoS) attack that targets poor memory management on a server or application

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Using multiple transparent or opaque layers to trick a user into clicking a button or link on another page when they had intended to click on the top page.

A

clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A virus that creates a new program that runs in the place of an expected program of the same name.

A

companion virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A form of web-based attack in which unauthorized commands are sent from a user that a website trusts.

A

cross-site request forgery (XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Running a script routine on a user’s machine from a website without their permission.

A

cross-site scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of attack that prevents any users—even legitimate ones—from using a system.

A

denial-of-service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The act of attempting to crack passwords by testing them against a list of dictionary words.

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public.

A

distributed denial-of-service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An attack method in which a daemon caches DNS reply packets, which sometimes contain other information (data used to fill the packets). The extra data can be scanned for information useful in a break-in or man-in-the-middle attack.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The DNS server is given information about a name server that it thinks is legitimate when it isn’t.

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The network service used in TCP/IP networks that trans-lates hostnames to IP addresses.

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Putting too much information into too small of a space that has been set aside for numbers.

A

integer overflow

22
Q

Making the data look as if it came from a trusted host when it didn’t

23
Q

A permission method in which users are granted only the privileges necessary to perform their job function.

A

principle of least privilege

24
Q

Any code that is hidden within an application and causes something unexpected to happen based on some criteria being met.

25
A software exploitation virus that works by using the macro feature included in many applications, such as Microsoft Office.
macro virus
26
Any code that is meant to do harm.
malicious code
27
A threat from someone inside the organization intent on doing harm.
malicious insider threat
28
An attack that occurs when someone/something that is trusted inter-cepts packets and retransmits them to another party.
man-in-the-middle / TCP Highjacking
29
A virus that attacks a system in more than one way.
multipartite virus
30
Attempting to ascertain a password that you should not know.
password attacks
31
A virus that modifies and alters other programs and databases.
phage virus
32
A large Internet Control Message Protocol (ICMP) packet sent to overflow the remote host’s buffer or causes the remote host to reboot or hang.
ping of death
33
An attribute of some viruses that allows them to mutate and appear differently each time they crop up.
polymorphic
34
The result when a user obtains access to a resource that they wouldn’t normally be able to access.
privilege escalation
35
Software that demands payment before restoring the data or system infected.
ransomware
36
An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection.
replay attack
37
A virus that attacks or bypasses the antivirus software installed on a computer.
retrovirus
38
A form of malware that tries to convince the user to pay for a fake threat.
rogueware
39
Software program that has the ability to obtain root-level access and hide certain things from the operating system.
rootkit
40
Software that tries to convince unsuspecting users that a threat exists.
scareware
41
A small library that is created to intercept API calls transparently.
shim
42
An attempt by someone or something to masquerade as someone/something else.
spoofing
43
Software programs that work—often actively—on behalf of a third party.
spyware
44
A virus that attempts to avoid detection by masking itself from applications or by installing itself into the boot sector.
stealth virus
45
Any application that masquerades as one thing in order to get past scrutiny and then does something malicious.
Trojan horse
46
Creating domains that are based on the misspelling of another.
typo squatting
47
Registering domains that are similar to those for a known entity but based on a misspelling or typographical error.
URL hijacking
48
A program intended to damage a computer system.
virus
49
Identifying a site that is visited by those whom they are targeting, poisoning that site, and then waiting for the results.
watering hole attack
50
An advanced attack that tries to get around detection and send a packet with every single option enabled.
Xmas attack
51
An attack that begins the very day an exploit is discovered.
zero-day exploit
52
Any system taking directions from a master control computer.
zombie