Shared Flashcard Set

Details

CompTIA A+ 220-701, 220-702 #4
Common Viruses and Attacks
40
Computer Science
Professional
01/27/2010

Additional Computer Science Flashcards

 


 

Cards

Term
Companion Virus
Definition
Attaches itself to legitimate programs and then creates programs with a different file extension.
Term
Macro Virus
Definition
A virus that attaches itself to a macro and can infect documents and spead through email.
Term
Macro Virus
Definition
The fastest growing exploitation today.
Term
Multipartite Virus
Definition
Attacks your system in many differnt ways.
Term
Phage Virus
Definition
Modifies other programs and databases. All infected applications must be reinstalled to fix it.
Term
Polymorphic Virus
Definition
Changes form, even encrypting parts of itself to avoid detection.
Term
Armored Virus
Definition
Covers itself with code that makes the important parts hard to detect.
Term
Retrovirus
Definition
Attacks or bypasses antivirus software. An anti-antivirus.
Term
Stealth Virus
Definition
Hides from applications. May attach itself to the boot sector of the hard drive.
Term
Update software, use Antivirus software and educate users.
Definition
Name the three most important methods to avoid getting malware.
Term
Back door attack
Definition
An application is used to create an entrance for the attacker. For instance, it might allow a certain username to have administrative privileges
Term
Back Door Attack
Definition
An attack that exploits maintenance hooks.
Term
Spoofing Attack
Definition
An attack where something or someone masquerades as something else.
Term
IP spoofing Attack
Definition
An attack where data is made to look like it came from a trusted host.
Term
Man in the Middle Attack
Definition
Software is put between the server and user to intercept data.
Term
Replay Attack
Definition
An attack where information, such as user name, password, or certificate, is captured and resubmitted.
Term
Password Guessing Attack
Definition
Account attacked repeatedly to try to guess the password.
Term
Brute Force Attack
Definition
A password guessing attack without a dictionary.
Term
Dictionary Attack
Definition
A password guessing attack, which can be automated, that uses a dictionary of commonly used passwords
Term
DOS Attack
Definition
An attack that uses a ping of death or a buffer overflow.
Term
Distributed Denial of Service Attack
Definition
DDOS Attack
Term
Root Kit
Definition
Allows process to be run that are hidden from the task manager
Term
Kerberos
Definition
Uses a Key Distribution Center
Term
WiFi Protected Access (WPA2 is better)
Definition
Define WPA
Term
Wireless Transport Layer Security
Definition
Define WTLS
Term
Vista Enterprise and Ultimate
Definition
What versions of windows does Bitlocker work with
Term
WML
Definition
What is HTML for wireless
Term
Encryption, Secure Hash Algorithm
Definition
Define SHA and SHA2
Term
Encryption Message Digest Algorithm
MD5, MD4, MD2
Definition
Define MDA
Term
Trusted Platform Module A chip to help create hash keys
Definition
What is a TPM?
Term
No write up or read down so data can't mix
Definition
Define the Biba Model
Term
Can't read up or write down, not concerned with data integrity
Definition
Define the Bell-LA Module
Term
Uses different applications to read, and write
Definition
Define Clark-Wilson Model
Term
TCP attack
Definition
Occurs when an attacker takes control of a network session
Term
Smurf Attack
Definition
Sends a ping to a group of hosts in a network, that ping is echoed back from the hosts and overwhelmes the network.
Term
.SCR and .PIF
Definition
Two extentions to disallow in attachments
Term
Windows 2000 = ERD, Windows XP and Vista used ARD
Definition
Which versions of windows uses ERD and ARD
Term
ICMP tunneling
Definition
Uses an ICMP packet to carry malicious code.
Term
TCP ACK flood attack
Definition
Sends packets to a server without an end packet thus filling up the server buffer and denying service to the server
Term
UDP attack
Definition
Uses maintenance protocol to overload a server
Supporting users have an ad free experience!