Home > Security Concepts 2

Security Concepts 2

September 4th, 2020 Go to comments

Question 1

Explanation

Malware means “malicious software”, is any software intentionally designed to cause damage to a computer, server, client, or computer network. The most popular types of malware includes viruses, ransomware and spyware.
Virus
Possibly the most common type of malware, viruses attach their malicious code to clean code and wait to be run.

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.

Spyware is spying software that can secretly record everything you enter, upload, download, and store on your computers or mobile devices. Spyware always tries to keep itself hidden.

An exploit is a code that takes advantage of a software vulnerability or security flaw.

Exploits and malware are two risks for endpoints that are not up to date. ARP spoofing and eavesdropping are attacks against the network while denial-of-service attack is based on the flooding of IP packets.

Question 2

Explanation

A trustpoint enrollment mode, which also defines the trustpoint authentication mode, can be performed via 3 main methods:

1. Terminal Enrollment – manual method of performing trustpoint authentication and certificate enrolment using copy-paste in the CLI terminal.
2. SCEP Enrollment – Trustpoint authentication and enrollment using SCEP over HTTP.
3. Enrollment Profile – Here, authentication and enrollment methods are defined separately. Along with terminal and SCEP enrollment methods, enrollment profiles provide an option to specify HTTP/TFTP commands to perform file retrieval from the Server, which is defined using an authentication or enrollment url under the profile.

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/211333-IOS-PKI-Deployment-Guide-Initial-Design.html

Question 3

Explanation

The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with the highest possible level of access privileges, similar to an ‘Administrator’ in Windows. The word ‘kit’ refers to the software that grants root-level access to the machine. Put the two together and you get ‘rootkit’, a program that gives someone – with legitimate or malicious intentions – privileged access to a computer.

There are four main types of rootkits: Kernel rootkits, User mode rootkits, Bootloader rootkits, Memory rootkits

Question 4

Explanation

A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them. Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such as credentials leaks, unauthorized access, data theft and DDoS attacks.

Question 5

Question 6

Explanation

Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem.

Comments (7) Comments
  1. Mikke
    September 4th, 2020

    Q3 isn’t B and C?
    B. virtual
    C. bootloader

  2. Jam
    September 5th, 2020

    I think user mode and bootloader are the best correct based on my research.

    https://heimdalsecurity.com/blog/rootkit/

    https://en.wikipedia.org/wiki/Rootkit#Hypervisor_level

  3. Anonymous
    September 7th, 2020
  4. natus
    January 20th, 2021

    please how do i get the question

  5. score
    October 21st, 2021

    please share study material

  6. Metgatz
    May 16th, 2022

    What are two rootkit types? (Choose two) C and D are correct.
    A. registry
    B. virtual
    C. bootloader
    D. user mode
    E. buffer mode

    1. Kernel rootkit
    2. Hardware or firmware rootkit
    3. Hyper-V rootkits
    4. Bootloader rootkit or bootkit
    5. Memory rootkit
    6. User-mode or application rootkit

  7. james
    June 7th, 2023

    How do we see the questions?

Add a Comment