• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

Name three types of Physical Threats?

  1. Snooping
  2. Theft and Loss of Assets
  3. Human Error (Electrostatic discharge)
  4. Sabotage

Name three methods of mitigating Snooping?

  1. Clean Desk Policy
  2. Shredding Documents
  3. Secure filing cabinets

Name four methods of mitigating the possibly Thefts?

  1. Use Lock-down Cable
  2. Remotely wipe device
  3. Password Protect (Safeguards on the Device)
  4. Data Encryption

Name a way to mitigate Sabotage?

Create a Recovery Plan.

Define Malicious Software?

Any software that harms or misuses the system, which includes deleting files from the system, monitoring activity on the system, or something is simple is slowing down the system.

Fourtypes of Malicious software exploitation are?

  1. Privilege Escalation: Vertical, deescalation and Horizontal
  2. Viruses
  3. Trojans
  4. Malware

Define what a Virus is?

Malicious software that infects the device and destroy data, prevent booting, or Hy-jack the system?

Define six type of Viruses?

  1. Executable
  2. Boot Sector Virus
  3. Macro Viruses: uses the macro automation
  4. Logic Bomb: are event driven
  5. Worm: are self replicating delivery system
  6. Trojan: typically opens the TCP/IP (NetBus)

Name three ways worms are replicated.

  1. Network Protocols: blaster worm replicated over the RPC port (135), SQL Slammer us replicated using buffer overflow attack.
  2. E-mail: Replicates by sending emails to contacts in your contact list. ILOVEYOU
  3. Flash Drive: Conficker

Name a command that can be used to track down a Trojan virus?

  1. netstat -na to listen to the ports
  2. Run netstat -o to find the PID
  3. Then track down the EXE associated with the process
  4. Run tasklist to see the processes (EXE files)
  5. run taskkill i.e. TASKKILL /IM notepad.exe

Name some types of Malware?

  1. Spyware: can monitor and change system
  2. Adware: auto loading adds
  3. Spam: Commercial e-mails
  4. Rootkits: Gives hacker access
  5. Botnets: collection of comprised systems used to perform attacks
  6. Keylogger

Name five method of blocking SPAM?

  1. Recipient Filter
  2. Sender Filter
  3. Connection Filter: IPs prohibited from connecting to SMTP server.
  4. Real-Time Blacklist (RBL): list of spam host
  5. Sender ID filter: SMTP Sender Policy Frame work (accetable senders) SPF in DNS

Name some types of Rootkits?

  1. Application-Level
  2. Library-Level
  3. Kernel-Level
  4. Virtualized: Stored on Operating system hard to detect.
  5. Firmware

What Back Doors and Ransom-ware created using Rootkits?

  1. A Back Door is malware that creates an is an alternative way to access the system. They use Trojans to open ports or create user accounts.
  2. Ransom-ware kidnaps the system

What are Polymorphic and Armored Viruses?

  1. Polymorphic malware alters itself to avoid detection.
  2. Armored malware protects itself from being analyzed.

Name ways a system be protected from Malicious Software?

  1. Use antivirus software
  2. Keep virus definitions up to date
  3. Monitor Listening Ports
  4. Monitor Running Processes
  5. Develop good surfing habits

What are Botnets?

Rootkits that use a group of systems controlled by the hacker to perform attacks on systems across the Internet. They are also know as Zombies.

What is a PBX?

Private Branch Exchange (PBX) used to share data, calls, VoIP calls etceterra.

What is Network Attached Storage (NAS)?

A device that connects to the network that has a group of drives installed. Typically a RAID that provides a central location to share files.

Name two of the types of clients NAS supports.

  1. Server Message Blocks (SMB) for Windows.
  2. Network File System (NFS) Linux

Which type of malware consumes memory and resources by running all the time in addition to sucking up bandwidth.

Spyware

Which type of Malware can appear to be useful, but can create a Backdoor?

Trojans