Term
A ___ is a software program or code loaded onto a computer without the user’s knowledge. |
|
Definition
|
|
Term
A ___ automatically propagates without modifying software or alerting the user. |
|
Definition
|
|
Term
A ___ ___ appears as a helpful or harmless program but when installed delivers a malicious payload. |
|
Definition
|
|
Term
___ covertly gathers system information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. |
|
Definition
|
|
Term
A ___ virus installs itself into the operating system and stays there. It typically loads with the operating system on boot. |
|
Definition
|
|
Term
A modification to an existing virus is called a ____ because it is a rereleased version of a known virus. |
|
Definition
|
|
Term
A ___ virus can change its characteristics to avoid detection. |
|
Definition
|
|
Term
A ___ virus overwrites files or code with modified data. |
|
Definition
|
|
Term
A ___ virus amends an application by adding files or code. |
|
Definition
|
|
Term
A ___ virus can hide itself to avoid detection. |
|
Definition
|
|
Term
A ___ virus is designed to infect and corrupt documents. |
|
Definition
|
|
Term
To be considered a virus, malware must be able to ___ itself, requires a ___ program as a carrier, and must be activated or ___ in order to run. |
|
Definition
|
|
Term
A ___ ___ is different from a virus because it does not replicate itself and does not require a host program to run. |
|
Definition
|
|
Term
Although it can replicate, a ___ does not require a host or user intervention to propagate. |
|
Definition
|
|
Term
A ___ ___ ___ attack floods a network with more traffic than it can handle. |
|
Definition
|
|
Term
In a ___ attack, spoofed UDP packets are sent to a network's broadcast address on specific ports to flood the network. |
|
Definition
|
|
Term
In a ___ attack, a ping request is sent to a broadcast network address, with the sending address spoofed so that many ping replies overload the victim and prevent it from processing the replies. |
|
Definition
|
|
Term
In a ___ ___ ___ attack, an oversized ICMP datagram is used to crash IP devices that were manufactured before 1996. |
|
Definition
|
|
Term
In a ___ attack, the victim is overwhelmed with a flood of SYN packets. |
|
Definition
|
|
Term
A ___ ___ is a type of denial of service attack that occurs when more data is put into a buffer than it can hold, thereby overflowing it. |
|
Definition
|
|
Term
An ___ -___ is a denial of service attack in which large numbers of ICMP messages are sent to a computer system to overwhelm it. The result is a failure of the TCP/IP protocol stack, which cannot tend to other TCP/IP requests. |
|
Definition
|
|
Term
A ___ attack is a brute force attack in which the attacker knows the username and guesses at the password. |
|
Definition
|
|
Term
___ ___ is a hacker term for tricking people into revealing their password or some form of security information. |
|
Definition
|
|
Term
Obtaining sensitive information by intercepting, listening to, and analyzing network communications is called ___. |
|
Definition
|
|
Term
In a ___ ___ attack, an attacker gains access to a computer or program by bypassing standard security mechanisms. |
|
Definition
|
|
Term
In a __-__-__-__ attack, the intruder places himself between the sending and receiving devices and captures the communication as it passes by. |
|
Definition
|
|
Term
When a man-in-the-middle attack is done with ftp (using the port command), it is known as a ___ ___ attack. |
|
Definition
|
|
Term
___ is a technique in which the real source of a transmission, file, or email is concealed or replaced with a fake source. |
|
Definition
|
|
Term
In a ___ ___ ___ attack, a wireless access point is placed on a network without the administrator's knowledge. |
|
Definition
|
|
Term
A ___ ___ attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information users transmit. |
|
Definition
|
|
Term
Driving around with a laptop looking for open wireless access points or weak implementations that can be cracked is called ___ ___. |
|
Definition
|
|
Term
Alerting others to open wireless systems by leaving a distinguishing mark is called ___ ___. |
|
Definition
|
|