Finals Flashcards

(35 cards)

1
Q

Virus structure ports

A

MITP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The function is performed

A

Execution phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The virus is activated to perform the function

A

Triggering phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The virus places an identical copy

A

Propagation phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The virus is idle

A

Dormant phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus phases

A

DPTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cracker program that searches out other program

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secretly takes over another internet

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performs some unwanted or harmful function

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disguise as something benign

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Code embedded in some legitimate programs

A

Logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another name for a trap door

A

Back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secret entry point

A

Trap door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Programs that cannot exist independently

A

Need host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Are self-contained program that can be scheduled

A

Independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of malicious code(all)

17
Q

Performs unauthorized functions causing normal operations to be abnormal

A

Malicious code

18
Q

According to them malicious code is bla bla

A

SPECTRIA InfoSec Services

19
Q

Security of applications is critical due to the reasons:

20
Q

Types of application

A

Mobile application
Web based application

21
Q

What an organization does to protect its critical data

A

Application security

22
Q

System flaw or weakness in an application

A

Application vulnerability

23
Q

ERP stands for?

24
Q

CRM stands for?

25
Re-infection attempt
Mark
26
Causes Spread to other file
Infection mechanism
27
Delivering payload
Trigger
28
Possible damage to infect computer
Payload
29
Types of viruses
30
Lodges in main memory
Memory-resident virus
31
Create copies during replication
Polymorphic virus
32
Initially accessed or booted
Boot sector virus
33
Designed to hide itself from detection
Stealth virus
34
Set of macro commands
Macro virus
35
A more recent development in malicious software
Email virus