Exam 3: Network and Computer Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What types of ports do successful Trojan programs commonly use?

Free
(Essay)
4.7/5
(34)
Correct Answer:
Verified

A good software or hardware firewall would most likely identify traffic that's using unfamiliar ports,but Trojan programs that use common ports,such as TCP port 80 (HTTP)or UDP port 53 (DNS),are more difficult to detect.
The programmer who wrote Backdoor.Slackbot.B controlled a computer by using Internet Relay Chat (IRC),which is on port 6667.

____________________ or rootkits are computer programs that give attackers a means of regaining access to the attacked computer later.

Free
(Short Answer)
4.7/5
(27)
Correct Answer:
Verified

Backdoors

Some security professionals use fear tactics to scare users into complying with security measures. Is this a good tactic?

Free
(Essay)
4.8/5
(35)
Correct Answer:
Verified

Some security professionals use fear tactics to scare users into complying with security measures.Their approach is to tell users that if they don't take a particular action,their computer systems will be attacked by every malcontent who has access to the Internet.This method is sometimes used to generate business for security testers and is not only unethical,but also against the OSSTMM's Rules of Engagement.The rule states: "The use of fear,uncertainty,and doubt may not be used in the sales or marketing presentations,websites,supporting materials,reports,or discussion of security testing for the purpose of selling or providing security tests.This includes but is not limited to crime,facts,criminal or hacker profiling,and statistics."
Your approach to users or potential customers should be promoting awareness rather than instilling fear.You should point out to users how important it is not to install computer programs-especially those not approved by the company-on their desktops because of the possibility of introducing malware.Users should be aware of potential threats,not terrified by them.

IDS stands for ____.

(Multiple Choice)
4.8/5
(41)

PKI stands for ____.

(Multiple Choice)
4.9/5
(34)

MATCHING Match each term with the correct statement below. -executable piece of programming code that should not appear in an e-mail attachment

(Multiple Choice)
4.8/5
(27)

MATCHING Match each term with the correct statement below. -purported to have shut down more than 13,000 ATMs

(Multiple Choice)
4.8/5
(44)

MATCHING Match each term with the correct statement below. -2005 hybrid worm with backdoor capabilities spread by mass e-mailing and exploiting Windows vulnerabilities

(Multiple Choice)
4.7/5
(38)

What is Back Orifice?

(Essay)
4.8/5
(34)

The virus signature file is maintained by ____ software.

(Multiple Choice)
5.0/5
(32)

MATCHING Match each term with the correct statement below. -worm that uses UDP port 8998 to contact the attacker's server

(Multiple Choice)
4.7/5
(29)

Macro viruses are hard to create.

(True/False)
4.8/5
(34)

The average home user or small-business owner doesn't typically use Telnet.

(True/False)
4.8/5
(38)

The two most popular spyware and adware removal programs are ____ and Ad-Aware.

(Multiple Choice)
4.8/5
(28)

The most effective approach to protect a network from malware being introduced is to conduct structured training of all employees and management.

(True/False)
5.0/5
(34)

Software keyloggers behave like ____ and are loaded on a computer.

(Multiple Choice)
4.9/5
(31)

Antivirus software compares ____________________ of known viruses against the files on the computer; if there's a match, the software warns you that the program or file is infected.

(Short Answer)
4.8/5
(40)

What is the difference between spyware and adware?

(Essay)
4.9/5
(43)

Describe an example of a macro virus.

(Essay)
4.7/5
(33)

____ is concerned with the security of computers or devices that are part of a network infrastructure.

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)