Cybersecurity Ch. 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Sends spoofed messages across a LAN to link a criminal's physical address with the logical address of an authorized member of the network.

ARP spoofing

The _________________ is an industry association focused on eliminating the identity theft and fraud that result from phishing and email spoofing.

Anti-Phishing Working Group

____________________________ allows criminals to inject scripts into the web pages viewed by users. This script can contain malicious code.

Cross-site scripting

modifies a domain naming server to reroute a specific domain name to a different logical address controlled by the criminal.

DNS server spoofing

Logic bomb triggers can be:

Dates User account deletion Times Other running programs

The first computer virus, called __________________________ , was created as a teenager's harmless prank, displaying random messages to users and played subtle tricks when an infected floppy disk was booted

Elk Cloner

Internet Protocol packets are sent from a spoofed source address to disguise itself.

IP spoofing

To prevent DoS and DDoS attacks, block external __________ packets at the network border.

Internet Control Message Protocol (ICMP)

Occurs when one computer accepts data packets based on the physical address of another computer.

MAC address spoofing

___________________________ takes control over a mobile device. The infected mobile device sends user-sensitive information to the attackers.

Man-In-The-Mobile

This disrupts the transmission of a radio or satellite station so that the signal does not reach the receiving station.

RF jamming

SEO Poisoning is short for _____________________________ Poisoning.

Search Engine Optimization

What is one of the worst computer viruses in history?

The Melissa Virus

Always scan email attachments before opening them. (T/F)

True

___________________________ is a security protocol that attempted to provide a wireless local area network (WLAN) with the same level of security as a wired LAN.

Wired Equivalent Privacy

An ______[a]_______ is a deliberate exploitation of a discovered weakness in computer information systems, either as specific targets or merely as targets of ______[b]______.

attack opportunity

A _________________ is a container that holds classified or sensitive documents for later destruction by fire.

burn bag

With XSS, if criminals obtain the victim's web session _______________, they can impersonate that user.

cookie

A _________________ is any type of offensive maneuver used by cyber criminals to target computer information systems, computer networks, or other computer devices.

cyberattack

Restrict access point placement with a network by placing these devices outside the firewall or within a _______________________________ which contains other untrusted devices.

demilitarized zone

When defending against attacks, configure firewalls to _______________ packets from outside of the network that have addresses indicating that they originated from inside the network.

discard

Computer viruses usually spread from:

downloads off the Internet email attachments removable media

This is a program that automatically downloads to the computer when a user visits a web site or views an HTML email message.

drive-by download

The most common goal of SEO poisoning is to increase traffic to malicious sites that may host malware or perform social _____________.

engineering

Rootkit Privilege ______________ takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.

escalation

An ____________________ attack uses a criminal's access point improved with higher power and higher gain antennas to look like a better connection option for users.

evil twin

A Trojan horse binds itself to executable files. (T/F)

false

Bluejacking occurs when an attacker copies a victim's information from his/her Bluetooth device. T/F

false

Bluesnarfing is the term used for sending unauthorized messages to another Bluetooth device. T/F

false

Cyber criminals succeed by continuously searching for and identifying systems with clear vulnerabilities. Common victims include patched systems. (T/F)

false

Defending against fast-moving Zero-Day Attacks attacks requires network security professionals to adopt a more simplistic view of their network architecture. T/F

false

Most viruses do not require end-user initiation. (T/F)

false

SEO poisoning uses SEO to make a malicious website appear lower in search results. (T/F)

false

The frequency, modulation, and power of an RF jammer needs to be less than that of the device that the criminal wants to disrupt in order to successfully jam the wireless signal. T/F

false

With XSS the cyber-criminal argets a victim directly. T/F

false

worms require a host program to run. (T/F)

false

As Flash-based content grew and became more popular, criminals examined ___________ and software, determined vulnerabilities, and exploited Flash Player.

flash plugins

Social engineers often rely on people's willingness to be ______________ but also prey on people's weaknesses.

helpful

The term zero _____________ describes the moment when someone discovers a zero-day attack.

hour

A criminal, posing as an IRS employee, tells a victim that they owe money to the IRS. The victim must pay immediately through a wire transfer. Failure to pay will result in an arrest. What type of cyber attack is most closely being perpetrated?

impersonation

Both XML and SQL _________________ attacks exploit weaknesses in database programs such as not validating database queries properly.

injection

Spam, also known as __________________, is unsolicited email. In most cases, spam is a method of advertising.

junk mail

This is a software program that records or logs the keystrokes of the user of the system.

keyboard logger

This is a malicious program that uses a trigger to awaken the malicious code.

logic bomb

This is a term used to describe software designed to disrupt computer operations, or gain access to computer systems, without the user's knowlege or permission.

malware

A ______________ prevents piggybacking by using two sets of doors. After individuals enter an outer door, that door must close before entering the inner door.

mantrap

Spam may have text with ________________ words or strange punctuation.

misspelled

In order to avoid detection, a virus may _____________.

mutate

A DoS attack results in some sort of interruption of ______________ services to users, devices, or applications

network

Worms are malicious code that replicates by independently exploiting vulnerabilities in ________________.

networks

When establishing Bluetooth pairing, both devices use the same _________________.

passkey

Cyber criminals use a packet sniffer and run WPA2 attacks offline on the ____________________.

passphrase

This occurs when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.

phishing

This occurs when a criminal tags along with an authorized person to gain entry into a secure location or a restricted area.

piggybacking

_________________ is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data.

pretexting

A Trojan horse exploits the _____________ of the user that runs it.

privileges

An attacker requests personal information from you in exchange for a gift. This is an example of ____________________.

quid pro quo

_____________ holds a computer system, or the data it contains, captive until the target makes a payment. It usually works by encrypting data in the computer with a key unknown to the user.

ransomware

A few common backdoor programs are Netbus and Back Orifice, which both allow ________ access to unauthorized system users.

remote

A __________ access point can also refer to a criminal's access point.

rogue

This persuades the user to take a specific action based on fear. It forges pop-up windows that resemble operating system dialogue windows. These windows convey forged messages stating that the system is at risk or needs the execution of a specific program to return to normal operation.

scareware

Spyware often bundles itself with legitimate software or with Trojan horses.. Many ___________ websites are full of spyware.

shareware

The key to an effective antivirus solution is to keep malware ______________ updated

signatures

___________________________ uses Short Message Service (SMS) to send fake text messages.

smishing

__________________ occurs when attackers examine all network traffic as it passes through their NIC, independent of whether or not the traffic is addressed to them or not

sniffing

The authors of grayware usually maintain legitimacy by including an application's capabilities in the small print of the ____________________________ agreement.

software license

This sends customized emails to a specific person. The criminal researches the target's interests before sending the email.

spear phishing

This is an impersonation attack, and it takes advantage of a trusted relationship between two systems.

spoofing

This is software that enables a criminal to obtain information about a user's computer activities.

spyware

An attacker can be in close proximity to his victim or the attacker can use binoculars or closed circuit cameras to shoulder ________.

surf

A ___________ is the possibility that a harmful event, such as an attack, will occur.

threat

Spyware often includes activity _____[a]_____, keystroke _____[b]_____, and data capture.

trackers collection

Criminals may have authorized users unknowingly run a _______________ program on their machine to install a backdoor program.

trojan horse

Ransomware propagates as a ________________ and is the result of a downloaded file or some software weakness.

trojan horse

A backdoor bypasses normal authentication used to access a system. (T/F)

true

A browser hijacker is malware that alters a computer's browser settings to redirect the user to unintended websites. (T/F)

true

A rootkit modifies the operating system to create a backdoor. (T/F)

true

Cyber criminals launch offensive maneuvers against both wired and wireless networks. (T/F)

true

DoS attacks are relatively simple to conduct, even by an unskilled attacker. (T/F)

true

Grayware includes mobile applications that behave in an annoying or undesirable manner. T/F

true

Keyboard loggers can be legitimate, commercial software. T/F

true

Logic Bombs have the ability to destroy hardware components via forced overheating. (T/F)

true

Malware has become an umbrella term used to describe all hostile or intrusive software. (T/F)

true

MitM allows the criminal to take control over a device without the user's knowledge. (T/F)

true

Most spam comes from multiple computers on networks infected by a virus or worm. (T/F)

true

Most viruses activate at a specific time or date. (T/F)

true

Opening an infected file can trigger a virus. (T/F)

true

Other than an initial infection, worms do not require user participation. (T/F)

true

Payment through an untraceable payment system is always the criminal's goal with ransomware. (T/F)

true

Physical security is important in preventing the introduction of sniffers on an internal network. (T/F)

true

Spam may looks like correspondence from a legitimate business. (T/F)

true

The the proper attack, cyber criminals can spoof an identity, modify existing data, destroy data, or become administrators of a database server. T/F

true

There is no provision for key management with WEP, so the number of people sharing the key will continually grow. T/F

true

WPA2 is susceptible to attack because cyber criminals can analyze the packets going between the access point and a legitimate user. T/F

true

Worms usually slow down networks. (T/F)

true

This is malicious executable code attached to another executable file, such as a legitimate program.

virus

A _______________ is a weakness that makes a target susceptible to an attack.

vulnerability

What are the three most common types of malware?

worms viruses Trojan horses

This threat is a computer attack that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.

zero-day

An attacker builds a network of infected hosts, called a botnet, The the infected hosts are called _______________________.

zombies


संबंधित स्टडी सेट्स

First Aid & CPR Final (Chapters 13-19)

View Set

Solving 3 x 3 Linear Systems *assignment*

View Set

NUR 4770- Exam 1: PrepU Ch. 66 Managment of Pts w/neurologic Dysfunction

View Set