Cyber-Security: Malwares
This flashcard set highlights common cybersecurity attacks like eavesdropping and denial-of-service, clarifies misconceptions about malware detection and the Ping of Death, and explains how base-64 encoding works.
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?
EavesDropping
Key Terms
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?
EavesDropping
The base-64 numbering system uses how many bits to represent a character?
6
Which type of attack cripples the network and prevents legitimate users from accessing network resources?
denial-of-service
Malware programs cannot be detected by antivirus programs.
False
The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the host can handle. True or False?
False
When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?
zombies
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack? | EavesDropping |
The base-64 numbering system uses how many bits to represent a character? | 6 |
Which type of attack cripples the network and prevents legitimate users from accessing network resources? | denial-of-service |
Malware programs cannot be detected by antivirus programs. | False |
The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the host can handle. True or False? | False |
When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following? | zombies |
When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks? | buffer overflow |
Which of the following physical security methods provides the ability to secure a company’s assets and document any individuals physical time of entry? | card access |
A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker? | social engineering |
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following? | worm |
What is the main purpose of malware? | Financial gain or destruction |
If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use? | Spyware |
Which of the following exploits might hide its destructive payload in a legitimate application or game? | Trojan program |
Whitelisting allows only approved programs to run on a computer. | True |
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing? | backdoor |
What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee? | ransomware |
Which of the following doesn’t attach itself to a host but can replicate itself? | Worm |
Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer? | heuristics |
Which of the following is an example of a macro programming language? | Visual Basic for Applications |
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail? | virus |
Antivirus software should be updated annually. True or False? | False |
To reduce the risk of a virus attack on a network, you should do which of the following? | All of the above |
What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system? | Keyloggers |
The acronym IDS stands for which of the following? | Intrusion Detection System |
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer? | signatures |
Which of the following is a good place to begin your search for vulnerabilities in Microsoft products? | Microsoft Security Bulletins |
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure? | Network security |
An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.) | Rootkit | Backdoor |
Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party? | Session hijacking |
One purpose of adware is to determine users' purchasing habits. True or False? | True |