Test Tips

 < Free Open Study > 



As stated throughout this book, these Test Tips are useful tools that you should skim over just before you take the exam. Use them as a final cram for the exam.

  • A virus will replicate itself until it uses up all available system resources such as memory or hard drive space.

  • Spyware is a program or piece of software that resides hidden on a system that monitors and logs the systems or another systems activities.

  • A worm is a type of virus that can replicate itself. However, worms do not attach to other programs.

  • Worms and viruses duplicate themselves, Trojans do not.

  • Malware is shorthand for malicious code. It is something that produces unwanted, unexpected results. It is a virus, Trojan horse, or worm.

  • System or boot infectors are older viruses that damage system files such as hard drives, the Master Boot Record (MBR), or the boot sector on a floppy disk.

  • Variants are new viruses or virus strains that sometimes modify the code of existing well-known viruses.

  • Most macro-type viruses are designed to insert numbers, characters, words, or phrases into documents or spreadsheets.

  • Viruses that are in the wild exist outside of controller virus research labs. Viruses that exist in these labs are known to be Zoo viruses.

  • The actual action that a virus carries out is called the virus’s payload.

  • A virus threat or risk rating is a calculated value that represents the possible level of severity or threat of a specific virus.

  • Most Trojan horses are hidden in Internet attachments that are often times distributed with e-mail and in the form of jokes, love letters, and misguiding advertisements.

  • A logic bomb can be a computer virus or Trojan horse that activates when certain conditions are met.

  • Blended threats typically will spread automatically by continuously scanning the Internet for Web servers with open or vulnerable TCP/IP ports. They also plant Trojans and logic bombs, as well as change permissions and utilize internal network mapped drives to spread.

  • A virus with stealth characteristics will hide itself and send bogus responses back to an antiviral software package scan, in order to avoid detection.

  • A polymorphic virus is a virus that possesses the ability to change its own internal code and byte structure as it is being duplicated.

  • The Backdoor.Subseven virus and its known variants—Backdoor.SubSeven.1_7, Backdoor-G, Backdoor.Trojan, and Sub7—are most commonly distributed through e-mail attachments and instant messaging file and program transfers.

  • NetBus is a remote administration Trojan horse type program that is similar to Back Orifice and Backdoor.Subseven, which must first be executed on a system by a user in order to be installed.

  • ILOVEYOU is a self-propagating worm that is included as an e-mail attachment to an e-mail titled, “ILOVEYOU.”

  • The Melissa (W97M.Melissa.A) virus is a macro virus that spreads very quickly when its payload is released or executed.

  • The Back Orifice Trojan horse is a program that is similar in nature to NetBus. It allows remote access to a computer system after a server application program has been executed on the remote or targeted computer system.

  • The Chernobyl virus, also named W98.CIH or just CIH, is an older space filler virus that targets earlier versions of operating systems such as Microsoft Windows 95 and Windows 98.

  • W32.Nimda.A@mm is a mass-mailing worm that targets the weaknesses of vulnerable, unpatched Microsoft IIS (Internet Information Server) Web servers.

  • W32.Klez.A@mm is a mass-mailing e-mail worm threat that exploits known weaknesses associated with Microsoft Outlook Express and Microsoft Outlook. (Remember what the “mm” means?)

  • If the Guest account is enabled in Microsoft Windows, it can be used to access shared resources without entering a password for authentication. This is a major security risk.

  • Root is the name of the administrative user account in UNIX and Linux.



 < Free Open Study > 



The Security+ Exam Guide. TestTaker's Guide Series
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net