Question
click below
click below
Question
Normal Size Small Size show me how
Security_1
Security Study Guide
Question | Answer |
---|---|
FTP Port Number(s): | 20 and 21 |
SSH Port Number(s): | 22 |
Telnet Port Number(s): | 23 |
SMTP (Outgoing Email) Port Number(s): | 25 |
TACACS Port Number(s): | 49 |
DNS Port Number(s): | 53 |
HTTP Port Number(s): | 80 |
Kerberos Port Number(s): | 88 |
POP3 Port Number(s): | 110 |
IMAP Port Number (s): | 143 |
SSL and HTTPS Port Number(s): | 443 |
Secure LDAP Port Number(s): | 636 |
L2TP Port Number(s): | 1701 |
PPTP Port Number(s): | 1723 |
RDP Port Number(s): | 3389 |
What is CIA? | Confidentiality, Integrity, Availablility |
A prerequisite for privilege escalation to occur: | Attacker must have already gained access to the system. |
What is a virus? | Sting of code that cannot automatically spread from one computer to another, but can spread from file to file. |
A virus requires: | Interaction from a user. |
What are 3 characteristics of a virus? | Replication mechanism, activation mechanism and an objective. |
How will a stealth virus attempt to avoid detection? | Masking itself applications by attaching itself to the boot sector of a hard drive. |
What might a multipartite virus attempt? | Infect boot sector, executable files, destroy application files. |
What can a hoax create? | As much damage as a real virus |
Detrimental effects of a hoax virus: | User are tricked into changing system configurations and technical support resources are consumed by increased user calls. |
How to most virus' spread? | |
How should you prevent the spread of virus'? | EMail attachment scanning |
A self-replication computer program: | Worm |
It uses a network to send copies of itself to other nodes and it may do so without any user intervention: | Worm |
It can autonomously replicate itself across a network: | Worm |
Malicious code that mimics a legitimate program in order to steal sensitive data. | Trojan |
What is the difference between a Trojan Horse and a Worm? | Worm self replicates while a Trojan Horse does not. |
Give an example of a Trojan: | Screen saver downloaded and installed and is now started to rename and delete random files. |
Will most likely open a backdoor on a system: | Trojan |
What can help mitigate Trojan threats? | Proper security permissions of files and folders. |
A malicious attack that is set off by a specific event, date or time: | Logic Bomb |
How does a logic bomb differ from a worm? | Always has a data or time component |
Give an example of a logic bomb: | Malicious code that enters a target system, lays dormant until a user opens the certain program, and then delets the contents of a second hard drive. |
Give an example of a logic bomb: | An attack executes ona system every three months. |