Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Name three types of Physical Threats? |
|
|
Name three methods of mitigating Snooping? |
|
|
Name four methods of mitigating the possibly Thefts? |
|
|
Name a way to mitigate Sabotage? |
Create a Recovery Plan. |
|
Define Malicious Software? |
Any software that harms or misuses the system, which includes deleting files from the system, monitoring activity on the system, or something is simple is slowing down the system. |
|
Fourtypes of Malicious software exploitation are? |
|
|
Define what a Virus is? |
Malicious software that infects the device and destroy data, prevent booting, or Hy-jack the system? |
|
Define six type of Viruses? |
|
|
Name three ways worms are replicated. |
|
|
Name a command that can be used to track down a Trojan virus? |
|
|
Name some types of Malware? |
|
|
Name five method of blocking SPAM? |
|
|
Name some types of Rootkits? |
|
|
What Back Doors and Ransom-ware created using Rootkits? |
|
|
What are Polymorphic and Armored Viruses? |
|
|
Name ways a system be protected from Malicious Software? |
|
|
What are Botnets? |
Rootkits that use a group of systems controlled by the hacker to perform attacks on systems across the Internet. They are also know as Zombies. |
|
What is a PBX? |
Private Branch Exchange (PBX) used to share data, calls, VoIP calls etceterra. |
|
What is Network Attached Storage (NAS)? |
A device that connects to the network that has a group of drives installed. Typically a RAID that provides a central location to share files. |
|
Name two of the types of clients NAS supports. |
|
|
Which type of malware consumes memory and resources by running all the time in addition to sucking up bandwidth. |
Spyware |
|
Which type of Malware can appear to be useful, but can create a Backdoor? |
Trojans |