Security_1 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| FTP Port Number(s): | 20 and 21 |
| SSH Port Number(s): | 22 |
| Telnet Port Number(s): | 23 |
| SMTP (Outgoing Email) Port Number(s): | 25 |
| TACACS Port Number(s): | 49 |
| DNS Port Number(s): | 53 |
| HTTP Port Number(s): | 80 |
| Kerberos Port Number(s): | 88 |
| POP3 Port Number(s): | 110 |
| IMAP Port Number (s): | 143 |
| SSL and HTTPS Port Number(s): | 443 |
| Secure LDAP Port Number(s): | 636 |
| L2TP Port Number(s): | 1701 |
| PPTP Port Number(s): | 1723 |
| RDP Port Number(s): | 3389 |
| What is CIA? | Confidentiality, Integrity, Availablility |
| A prerequisite for privilege escalation to occur: | Attacker must have already gained access to the system. |
| What is a virus? | Sting of code that cannot automatically spread from one computer to another, but can spread from file to file. |
| A virus requires: | Interaction from a user. |
| What are 3 characteristics of a virus? | Replication mechanism, activation mechanism and an objective. |
| How will a stealth virus attempt to avoid detection? | Masking itself applications by attaching itself to the boot sector of a hard drive. |
| What might a multipartite virus attempt? | Infect boot sector, executable files, destroy application files. |
| What can a hoax create? | As much damage as a real virus |
| Detrimental effects of a hoax virus: | User are tricked into changing system configurations and technical support resources are consumed by increased user calls. |
| How to most virus' spread? | |
| How should you prevent the spread of virus'? | EMail attachment scanning |
| A self-replication computer program: | Worm |
| It uses a network to send copies of itself to other nodes and it may do so without any user intervention: | Worm |
| It can autonomously replicate itself across a network: | Worm |
| Malicious code that mimics a legitimate program in order to steal sensitive data. | Trojan |
| What is the difference between a Trojan Horse and a Worm? | Worm self replicates while a Trojan Horse does not. |
| Give an example of a Trojan: | Screen saver downloaded and installed and is now started to rename and delete random files. |
| Will most likely open a backdoor on a system: | Trojan |
| What can help mitigate Trojan threats? | Proper security permissions of files and folders. |
| A malicious attack that is set off by a specific event, date or time: | Logic Bomb |
| How does a logic bomb differ from a worm? | Always has a data or time component |
| Give an example of a logic bomb: | Malicious code that enters a target system, lays dormant until a user opens the certain program, and then delets the contents of a second hard drive. |
| Give an example of a logic bomb: | An attack executes ona system every three months. |
Created by:
jsowers105@aol.com
Popular Computers sets