• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
A virus can be triggered by inserting a USB drive into a system. True or False
True
Viruses typically have 2 primary components. What re they?
1.) Replication component
2.) Activation component
Nowadays, virus will rarely destroy data on the system where it's installed. Why?
It will try to stay hidden on the same system as long as possible.
1.) A zombie is only useful as long as it is operational on the PC.
2.) If the virus destroys data on the system, the system loses it usefulness to the criminal.
What is the difference between Polymorphic and Metamorphic?
Polymorphic - Even though the file changes, the code used to replicate and deliver the payload remains the same.

Metamorphic - This virus actually mutates the code used to replicate and deliver a payload.
What 3 things can you do to prevent WORMS to travel over a network?
1.) Up-To-Date AV software on all hosts.
2.) Host-Based firewalls on all systems
3.) Reduce attack surface by removing unneeded protocols.
Microsoft 64-bit systems have added additional protections against rootkits. What is it called?
Kernal Patchguard protection
What is Mobile code?
It is any code that can be transferred between systems without the user taking explicit action to install it.
Name 3 examples of mobile code.
1.) Scripts such as JavaScript
2.) Java applets or ActiveX controls
3.) Documents that include macros
What is the difference between backdoors and trapdoors?
Nothing. They are the same.
Application developers often add backdoor code to an application for debugging purposes.
TRUE or FALSE?
TRUE
What is a Malware Hoaxes?
A malware hoax is a false message about a malware risk that does not exist. Hoaxes are commonly spread via the e-mail. They commonly include a sense of urgency using caps like URGENT!!! VIRUS ALERT!!!

Finally, hoaxes just waste people time as they really do nothing but spread fear and waste people time.
Name 3 methods of increasing software security on organization SW applications.
1.) Input validation
2.) Code signing
3.) Application Reviews
Input validation does not verify the accuracy of the data. TRUE of FALSE?
TRUE.
It only checks if the input is valid.
Input validation is shown on webpages as (*) next to items that need to be addresses.
Input validation can prevent 3 major type of attacks. What are they?
1.) Buffer overflow
2.) SQL injection
3.) Cross-site Scripting
What is CSS?
Cross-Site Scripting
Sometimes called XSS
Attempts to inject HTML or JavaScript code into a web page.
SQL injection attacks are prevented with by what?
1.) Input validation
2.) Stored Porcedures
A stored procedure is a group of SQL statements that executes as a small program.
SPF records are a newer technology used to reduce spam by what?
SPF = Sender Policy Framework
By identifying spoofed e-mail.
What is a good way to keep up with current malware threats?
Sign up for e-mail alerts to US-CERT.
US computer Emergency Readiness Team.