Information Technology /Cyber-Security: Malwares

Cyber-Security: Malwares

Information Technology30 CardsCreated about 2 months ago

This flashcard set highlights common cybersecurity attacks like eavesdropping and denial-of-service, clarifies misconceptions about malware detection and the Ping of Death, and explains how base-64 encoding works.

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

EavesDropping

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/30

Key Terms

Term
Definition

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

EavesDropping

The base-64 numbering system uses how many bits to represent a character?

6

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

denial-of-service

Malware programs cannot be detected by antivirus programs.

False

The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the host can handle. True or False?

False

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

zombies

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

EavesDropping

The base-64 numbering system uses how many bits to represent a character?

6

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

denial-of-service

Malware programs cannot be detected by antivirus programs.

False

The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the host can handle. True or False?

False

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

zombies

When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks?

buffer overflow

Which of the following physical security methods provides the ability to secure a company’s assets and document any individuals physical time of entry?

card access

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

social engineering

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

worm

What is the main purpose of malware?

Financial gain or destruction

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

Spyware

Which of the following exploits might hide its destructive payload in a legitimate application or game?

Trojan program

Whitelisting allows only approved programs to run on a computer.

True

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

backdoor

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

ransomware

Which of the following doesn’t attach itself to a host but can replicate itself?

Worm

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

heuristics

Which of the following is an example of a macro programming language?

Visual Basic for Applications

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

virus

Antivirus software should be updated annually. True or False?

False

To reduce the risk of a virus attack on a network, you should do which of the following?

All of the above

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

Keyloggers

The acronym IDS stands for which of the following?

Intrusion Detection System

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

signatures

Which of the following is a good place to begin your search for vulnerabilities in Microsoft products?

Microsoft Security Bulletins

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Network security

An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)

Rootkit

| Backdoor

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

Session hijacking

One purpose of adware is to determine users' purchasing habits. True or False?

True