click below
click below
Normal Size Small Size show me how
Security_1
Security Study Guide
| Question | Answer |
|---|---|
| FTP Port Number(s): | 20 and 21 |
| SSH Port Number(s): | 22 |
| Telnet Port Number(s): | 23 |
| SMTP (Outgoing Email) Port Number(s): | 25 |
| TACACS Port Number(s): | 49 |
| DNS Port Number(s): | 53 |
| HTTP Port Number(s): | 80 |
| Kerberos Port Number(s): | 88 |
| POP3 Port Number(s): | 110 |
| IMAP Port Number (s): | 143 |
| SSL and HTTPS Port Number(s): | 443 |
| Secure LDAP Port Number(s): | 636 |
| L2TP Port Number(s): | 1701 |
| PPTP Port Number(s): | 1723 |
| RDP Port Number(s): | 3389 |
| What is CIA? | Confidentiality, Integrity, Availablility |
| A prerequisite for privilege escalation to occur: | Attacker must have already gained access to the system. |
| What is a virus? | Sting of code that cannot automatically spread from one computer to another, but can spread from file to file. |
| A virus requires: | Interaction from a user. |
| What are 3 characteristics of a virus? | Replication mechanism, activation mechanism and an objective. |
| How will a stealth virus attempt to avoid detection? | Masking itself applications by attaching itself to the boot sector of a hard drive. |
| What might a multipartite virus attempt? | Infect boot sector, executable files, destroy application files. |
| What can a hoax create? | As much damage as a real virus |
| Detrimental effects of a hoax virus: | User are tricked into changing system configurations and technical support resources are consumed by increased user calls. |
| How to most virus' spread? | |
| How should you prevent the spread of virus'? | EMail attachment scanning |
| A self-replication computer program: | Worm |
| It uses a network to send copies of itself to other nodes and it may do so without any user intervention: | Worm |
| It can autonomously replicate itself across a network: | Worm |
| Malicious code that mimics a legitimate program in order to steal sensitive data. | Trojan |
| What is the difference between a Trojan Horse and a Worm? | Worm self replicates while a Trojan Horse does not. |
| Give an example of a Trojan: | Screen saver downloaded and installed and is now started to rename and delete random files. |
| Will most likely open a backdoor on a system: | Trojan |
| What can help mitigate Trojan threats? | Proper security permissions of files and folders. |
| A malicious attack that is set off by a specific event, date or time: | Logic Bomb |
| How does a logic bomb differ from a worm? | Always has a data or time component |
| Give an example of a logic bomb: | Malicious code that enters a target system, lays dormant until a user opens the certain program, and then delets the contents of a second hard drive. |
| Give an example of a logic bomb: | An attack executes ona system every three months. |