Term
|
Definition
| malicous software which represents a type of software code designed to cause destructive damages to infected systems and system users. |
|
|
Term
| Is the damage done from malware harmful to the software or the hardware? |
|
Definition
| Software-data, fioles, and software installed on the noeds |
|
|
Term
| What are the top three types of malware? |
|
Definition
| Trojans, Viruses and worms |
|
|
Term
|
Definition
| Displays uninvited advertisements |
|
|
Term
|
Definition
| steals personal information and monitor/tracks |
|
|
Term
|
Definition
| An executable program and, if infected, can result in various effects ranging from mild annoyance to more serious damages to user data or programs installed in the system |
|
|
Term
|
Definition
| is a program designed to replicate itself and spread to other computers over the network without human interventions |
|
|
Term
| What is one of the most destructive effects of a worm? |
|
Definition
| Disrupted Network Performance |
|
|
Term
| What is one of the most destructive effects of a worm? |
|
Definition
| Disrupted Network Performance |
|
|
Term
|
Definition
| A malicious code sometimes hiding within a legitimate program downloaded from a website or sent in an email attachment and triggered on its execution |
|
|
Term
| What are Trojans designed to do? |
|
Definition
| Create a backdoor so that attackers obtain sneak access to a target system by bypassing the normal authentication and login procedure. |
|
|
Term
| What are some of the things that the hacker can accomplish once the Trojan is in place? |
|
Definition
| Uploading and downloading of files, planting zombies for subsequent DDOS attacks for the victims, stealing passwords and other sensitive information, installing spyware for keystroke monitoring and gathering email addresses for email distribution. |
|
|
Term
| Is it common for malware to combine multiple types of viruses? |
|
Definition
| Yes nowadays, many malware files use multiple types |
|
|
Term
| If you uninstall the software that has the malware, does it rollback the damage? |
|
Definition
| usually not because of the fact that malware generally changes settings permanently |
|
|
Term
| Do malware attacks occur at the application or operating system level? |
|
Definition
|
|
Term
| What happens in an attack at the OS level? |
|
Definition
| The malware will change out OS files |
|
|
Term
|
Definition
| The checking of the software using hashtags |
|
|
Term
| How many sites should an IT professional use to check the integrity of the Hash Tags? |
|
Definition
| at a minimum or two or more mirror sites |
|
|
Term
|
Definition
| an algorithm that maps large data sets of variable length to smaller data sets of a fixed length |
|
|
Term
| What are the methods used to steal passwords? |
|
Definition
| trial-and-errors(guesswork), Social engineering, phishing, login spoofing, malwares (ex. keystroke logging), and password cracking |
|
|
Term
|
Definition
| uses software tools and brute processing capacity of a computer to obtain or steal user passwords |
|
|
Term
| Are hash values one-way or two way? |
|
Definition
| One way functions thus making them great for security authentication |
|
|
Term
|
Definition
| Breaks an encrypted or hashed password by trying every possible key/password exhaustively in an automated fashion using a computer's brute force. |
|
|
Term
|
Definition
| attempts to reveal passwords by lining an electronic dictionary file that contains a list of dictionary words to password cracking software |
|
|
Term
| Can password cracking programs be used for good? |
|
Definition
| yes because systems administrators might use them to recover lost/forgotten passwords |
|
|
Term
| Is spoofing synonymous with masquerading? |
|
Definition
|
|
Term
|
Definition
| defined as pretending (or faking) to be someone or something |
|
|
Term
| IP and MAC Address Spoofing |
|
Definition
| IP Address-the source IP address is replaced with another one to mask the sender's true identity |
|
|
Term
| Can MAC spoofing be used to disrupt or degrade network performance? |
|
Definition
|
|
Term
|
Definition
| an email sender can disguise/fake its originating email address |
|
|
Term
|
Definition
| Happens when a person is tricked into communication with a copycat website, not the original website. |
|
|
Term
|
Definition
| Happens when a person is tricked into communication with a copycat web site, not the original website. |
|
|
Term
| In web spoofing, does the fake website usually look like the original? |
|
Definition
| YES! they usually have the same logos... |
|
|
Term
|
Definition
| The process of tricking people into clicking on or going into some website. |
|
|
Term
|
Definition
| one or more attackers generate enough traffic targeting a particular server...with so much traffic it totally slows down the network. |
|
|
Term
|
Definition
| A typical form of DOS attack floods a target server with requests for communication |
|
|
Term
|
Definition
| flood the server with SYN messages (to pretend handshaking attempts)...this limits available resources for legitimate uses |
|
|
Term
|
Definition
| flood the server with SYN messages (to pretend handshaking attempts)...this limits available resources for legitimate uses |
|
|
Term
|
Definition
| (Distributed Denial of Service) for which zombie programs are planted in a number of innocent computers and they launch attacks to a target server at once |
|
|
Term
|
Definition
| a form of DOS attack on network switches, which disrupts or disables normal switching operations. |
|
|
Term
| What are the three ways to prevent MAC Address Flooding? |
|
Definition
| 1) Allowing only one or more legitmate legitmate MAC address per port 2) automatic shutdown or a port if an unauthorized computer attempts to join it. 3) Shutting off all unused ports of switch |
|
|
Term
|
Definition
| On the computer network is equivalent to the tire-tapping of telephone lines in an attempt to steal information. |
|
|
Term
| Wireshark (formerly Etheral) |
|
Definition
| A GUI tool that can sniff PDUs of popular protocols |
|
|
Term
| What mode can you prevent wireshark? |
|
Definition
|
|
Term
|
Definition
| is an act of probing the ports of a target host in an automated fashion using a software tool |
|
|
Term
| What are some of the well known and most used ports? |
|
Definition
| 80(HTTP), 21(FTP), 23(Telnet) |
|
|
Term
| When does port scanning occur? |
|
Definition
| At the early stages of an attack! |
|
|
Term
|
Definition
| A collection of non-technical approaches designed to manipulate people in an effort to obtain unauthorized access to a target system or to steal private and oftentimes confidential information. |
|
|
Term
| Are social engineering more or less dangerous than high-tech driven attacks? |
|
Definition
|
|
Term
|
Definition
| Occurs when a hacker is able to intercept their messages and relay (or substitute) them as a middle man. The two communicating parties have no idea of the session hacking and believe that they are talking to valid partners. |
|
|
Term
|
Definition
| Primarily represents unsolicited commercial emails and becomes more of a nuisance unless it hides an executable harmful code. Spam is different from emails a recipient opts in to receive, oftentimes as a result of a marketing promotion by senders. |
|
|
Term
|
Definition
| are computer programs that can gather email addresses from various online sources including websites, mailing list archives, message boards, and online forms, and bring them back to their evil master for spamming |
|
|
Term
|
Definition
| With a utility tool anone can capture broadcasted WLAN frames while driving or walking around areas with WL |
|
|
Term
|
Definition
| generally means a WAP installed by an employee of a company for personal usage without obtaining the firm's authorization |
|
|
Term
| What is the next generation of the internet that will replace IPv4? |
|
Definition
|
|