Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
A virus can be triggered by inserting a USB drive into a system. True or False
|
True
|
|
Viruses typically have 2 primary components. What re they?
|
1.) Replication component
2.) Activation component |
|
Nowadays, virus will rarely destroy data on the system where it's installed. Why?
|
It will try to stay hidden on the same system as long as possible.
1.) A zombie is only useful as long as it is operational on the PC. 2.) If the virus destroys data on the system, the system loses it usefulness to the criminal. |
|
What is the difference between Polymorphic and Metamorphic?
|
Polymorphic - Even though the file changes, the code used to replicate and deliver the payload remains the same.
Metamorphic - This virus actually mutates the code used to replicate and deliver a payload. |
|
What 3 things can you do to prevent WORMS to travel over a network?
|
1.) Up-To-Date AV software on all hosts.
2.) Host-Based firewalls on all systems 3.) Reduce attack surface by removing unneeded protocols. |
|
Microsoft 64-bit systems have added additional protections against rootkits. What is it called?
|
Kernal Patchguard protection
|
|
What is Mobile code?
|
It is any code that can be transferred between systems without the user taking explicit action to install it.
|
|
Name 3 examples of mobile code.
|
1.) Scripts such as JavaScript
2.) Java applets or ActiveX controls 3.) Documents that include macros |
|
What is the difference between backdoors and trapdoors?
|
Nothing. They are the same.
|
|
Application developers often add backdoor code to an application for debugging purposes.
TRUE or FALSE? |
TRUE
|
|
What is a Malware Hoaxes?
|
A malware hoax is a false message about a malware risk that does not exist. Hoaxes are commonly spread via the e-mail. They commonly include a sense of urgency using caps like URGENT!!! VIRUS ALERT!!!
Finally, hoaxes just waste people time as they really do nothing but spread fear and waste people time. |
|
Name 3 methods of increasing software security on organization SW applications.
|
1.) Input validation
2.) Code signing 3.) Application Reviews |
|
Input validation does not verify the accuracy of the data. TRUE of FALSE?
|
TRUE.
It only checks if the input is valid. Input validation is shown on webpages as (*) next to items that need to be addresses. |
|
Input validation can prevent 3 major type of attacks. What are they?
|
1.) Buffer overflow
2.) SQL injection 3.) Cross-site Scripting |
|
What is CSS?
|
Cross-Site Scripting
Sometimes called XSS Attempts to inject HTML or JavaScript code into a web page. |
|
SQL injection attacks are prevented with by what?
|
1.) Input validation
2.) Stored Porcedures A stored procedure is a group of SQL statements that executes as a small program. |
|
SPF records are a newer technology used to reduce spam by what?
|
SPF = Sender Policy Framework
By identifying spoofed e-mail. |
|
What is a good way to keep up with current malware threats?
|
Sign up for e-mail alerts to US-CERT.
US computer Emergency Readiness Team. |