Term
|
Definition
malicous software which represents a type of software code designed to cause destructive damages to infected systems and system users. |
|
|
Term
Is the damage done from malware harmful to the software or the hardware? |
|
Definition
Software-data, fioles, and software installed on the noeds |
|
|
Term
What are the top three types of malware? |
|
Definition
Trojans, Viruses and worms |
|
|
Term
|
Definition
Displays uninvited advertisements |
|
|
Term
|
Definition
steals personal information and monitor/tracks |
|
|
Term
|
Definition
An executable program and, if infected, can result in various effects ranging from mild annoyance to more serious damages to user data or programs installed in the system |
|
|
Term
|
Definition
is a program designed to replicate itself and spread to other computers over the network without human interventions |
|
|
Term
What is one of the most destructive effects of a worm? |
|
Definition
Disrupted Network Performance |
|
|
Term
What is one of the most destructive effects of a worm? |
|
Definition
Disrupted Network Performance |
|
|
Term
|
Definition
A malicious code sometimes hiding within a legitimate program downloaded from a website or sent in an email attachment and triggered on its execution |
|
|
Term
What are Trojans designed to do? |
|
Definition
Create a backdoor so that attackers obtain sneak access to a target system by bypassing the normal authentication and login procedure. |
|
|
Term
What are some of the things that the hacker can accomplish once the Trojan is in place? |
|
Definition
Uploading and downloading of files, planting zombies for subsequent DDOS attacks for the victims, stealing passwords and other sensitive information, installing spyware for keystroke monitoring and gathering email addresses for email distribution. |
|
|
Term
Is it common for malware to combine multiple types of viruses? |
|
Definition
Yes nowadays, many malware files use multiple types |
|
|
Term
If you uninstall the software that has the malware, does it rollback the damage? |
|
Definition
usually not because of the fact that malware generally changes settings permanently |
|
|
Term
Do malware attacks occur at the application or operating system level? |
|
Definition
|
|
Term
What happens in an attack at the OS level? |
|
Definition
The malware will change out OS files |
|
|
Term
|
Definition
The checking of the software using hashtags |
|
|
Term
How many sites should an IT professional use to check the integrity of the Hash Tags? |
|
Definition
at a minimum or two or more mirror sites |
|
|
Term
|
Definition
an algorithm that maps large data sets of variable length to smaller data sets of a fixed length |
|
|
Term
What are the methods used to steal passwords? |
|
Definition
trial-and-errors(guesswork), Social engineering, phishing, login spoofing, malwares (ex. keystroke logging), and password cracking |
|
|
Term
|
Definition
uses software tools and brute processing capacity of a computer to obtain or steal user passwords |
|
|
Term
Are hash values one-way or two way? |
|
Definition
One way functions thus making them great for security authentication |
|
|
Term
|
Definition
Breaks an encrypted or hashed password by trying every possible key/password exhaustively in an automated fashion using a computer's brute force. |
|
|
Term
|
Definition
attempts to reveal passwords by lining an electronic dictionary file that contains a list of dictionary words to password cracking software |
|
|
Term
Can password cracking programs be used for good? |
|
Definition
yes because systems administrators might use them to recover lost/forgotten passwords |
|
|
Term
Is spoofing synonymous with masquerading? |
|
Definition
|
|
Term
|
Definition
defined as pretending (or faking) to be someone or something |
|
|
Term
IP and MAC Address Spoofing |
|
Definition
IP Address-the source IP address is replaced with another one to mask the sender's true identity |
|
|
Term
Can MAC spoofing be used to disrupt or degrade network performance? |
|
Definition
|
|
Term
|
Definition
an email sender can disguise/fake its originating email address |
|
|
Term
|
Definition
Happens when a person is tricked into communication with a copycat website, not the original website. |
|
|
Term
|
Definition
Happens when a person is tricked into communication with a copycat web site, not the original website. |
|
|
Term
In web spoofing, does the fake website usually look like the original? |
|
Definition
YES! they usually have the same logos... |
|
|
Term
|
Definition
The process of tricking people into clicking on or going into some website. |
|
|
Term
|
Definition
one or more attackers generate enough traffic targeting a particular server...with so much traffic it totally slows down the network. |
|
|
Term
|
Definition
A typical form of DOS attack floods a target server with requests for communication |
|
|
Term
|
Definition
flood the server with SYN messages (to pretend handshaking attempts)...this limits available resources for legitimate uses |
|
|
Term
|
Definition
flood the server with SYN messages (to pretend handshaking attempts)...this limits available resources for legitimate uses |
|
|
Term
|
Definition
(Distributed Denial of Service) for which zombie programs are planted in a number of innocent computers and they launch attacks to a target server at once |
|
|
Term
|
Definition
a form of DOS attack on network switches, which disrupts or disables normal switching operations. |
|
|
Term
What are the three ways to prevent MAC Address Flooding? |
|
Definition
1) Allowing only one or more legitmate legitmate MAC address per port 2) automatic shutdown or a port if an unauthorized computer attempts to join it. 3) Shutting off all unused ports of switch |
|
|
Term
|
Definition
On the computer network is equivalent to the tire-tapping of telephone lines in an attempt to steal information. |
|
|
Term
Wireshark (formerly Etheral) |
|
Definition
A GUI tool that can sniff PDUs of popular protocols |
|
|
Term
What mode can you prevent wireshark? |
|
Definition
|
|
Term
|
Definition
is an act of probing the ports of a target host in an automated fashion using a software tool |
|
|
Term
What are some of the well known and most used ports? |
|
Definition
80(HTTP), 21(FTP), 23(Telnet) |
|
|
Term
When does port scanning occur? |
|
Definition
At the early stages of an attack! |
|
|
Term
|
Definition
A collection of non-technical approaches designed to manipulate people in an effort to obtain unauthorized access to a target system or to steal private and oftentimes confidential information. |
|
|
Term
Are social engineering more or less dangerous than high-tech driven attacks? |
|
Definition
|
|
Term
|
Definition
Occurs when a hacker is able to intercept their messages and relay (or substitute) them as a middle man. The two communicating parties have no idea of the session hacking and believe that they are talking to valid partners. |
|
|
Term
|
Definition
Primarily represents unsolicited commercial emails and becomes more of a nuisance unless it hides an executable harmful code. Spam is different from emails a recipient opts in to receive, oftentimes as a result of a marketing promotion by senders. |
|
|
Term
|
Definition
are computer programs that can gather email addresses from various online sources including websites, mailing list archives, message boards, and online forms, and bring them back to their evil master for spamming |
|
|
Term
|
Definition
With a utility tool anone can capture broadcasted WLAN frames while driving or walking around areas with WL |
|
|
Term
|
Definition
generally means a WAP installed by an employee of a company for personal usage without obtaining the firm's authorization |
|
|
Term
What is the next generation of the internet that will replace IPv4? |
|
Definition
|
|