Week 4 Flashcards

1
Q

-Is an object, person, or other entity that presents an ongoing danger to an asset.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the meaning of malware

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any program or file that is harmful to a computer user.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of walmare

A

VIRUS,TROJAN HORSE,POLYMORPHIC
Worm, backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give forces of nature

A

EARTHQUAKE
FLOOD
TSUNAMI
TYPHOON
TORNADO
FIRE
LANDSLIDE
LIGHTNING
ELECTROSTATIC DISCHARGE
DUST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an act that takes advantage of a vulnerability to a compromise a controlled system.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an identified weakness in a controlled system, where controls are not present or are no longer effective.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-The application of computing and network resources to try every possible password combination.

A

BRUTE FORCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

-An attempt to reverse-calculate a password.

A

CRACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

-A variation of the brute force attack which narrows the filed by selecting specific target accounts and using a list of commonly used password instead of random combinations.

A

DICTIONARY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

-The attacker sends a large number of connection or information requests to a target.

A

DENIAL-OF-SERVICE (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

-An attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

A

DISTRIBUTED DENIAL-OF-SERVICE (DDOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-A technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

A

SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-TCP Hijacking attack, an attacker monitors packets from a network, modifiers them, and inserts them back into the network.

A

MAN IN THE MIDDLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

-An attacker routes large quantities of e-mail to the target.

A

MAIL BOMBING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-The process of using skills to convince people to reveal access credentials or other valuable information to the attacker.

A

SOCIAL ENGINEERING

17
Q

-An attempt to gain personal or financial information from an individual, usually by posing as a legitimate entity.

A

PHISHING

18
Q

-The redirection of legitimate web traffic to an illegitimate site for the purpose of obtaining private information.

A

PHARMING