What is it called when a hacker is able to get into a system through a secret entryway in order to maintain remote access to the computer quizlet?
Includes fences, door locks, mantraps, turnstiles, device locks, and server cages: Show
d. Trusted Platform Module Trusted Platform Module (TPM) refers to a secure crypto-processor used to authenticate hardware devices such as a PC or laptop. The idea behind TPM is to allow any encryption-enabled application to take advantage of the chip. Answer A is incorrect because public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Answer B is incorrect because full-disk encryption involves encrypting the operating system partition on a computer and then booting and running with the system drive encrypted at all times. Answer C is incorrect because in file- or folder-level encryption, individual files or folders are encrypted by the file system itself. c. Physical Physical controls include facility design details such as layout, door, locks, guards, and surveillance systems. Management controls include policies and procedures, whereas technical controls include access control systems, encryption, and data classification solutions, making answers A and B incorrect. Access controls include all three classifications (management, technical, and physical), making Answer D incorrect because the question asks for a specific type. a. VPC The HSM and cloud machines can both live on the same virtual private network through the use of a virtual private cloud (VPC) environment. This type of solution is mainly found in private datacenters that manage and offload cryptography with dedicated hardware appliances. Answer B is incorrect because traditionally HSMs have been used in the banking sector to secure numerous large, bulk transactions. Answer C is incorrect because TPM refers to a secure crypto-processor used to authenticate hardware devices such as a PC or laptop. Answer D is incorrect because public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. With subnetting, rather than simply having networks and hosts, networks can effectively be divided into three parts: _______________. a. network, subnet, and port TCP/IP uses its own four-layer architecture that includes _______________ layers. a. Network Interface, Internet, Transport, and Application Personal characteristics - such as full name, date of birth, height,
ethnicity, place of birth, mother's maiden name, and biometric characteristics - In order for a virus to spread, it requires a person to transfer an infected file from their computer to another. A worm requires no human intervention, it transfers itself by itself to any devices on the same network. Sets with similar termsWhat is it called when a hacker is able to get into a system through a secret entryway in order to maintain remote access to the computer?A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network or software application.
What type of attack can a hacker perform that involves injecting malicious code into a website to hijack a session cookie?Cross-Site Scripting (XSS)
But if the attacker would rather directly target a website's users, they may opt for a cross-site scripting attack. Similar to an SQL injection attack, this attack also involves injecting malicious code into a website, but in this case the website itself is not being attacked.
What is called if a hacker takes down multiple services very quickly with the help of botnets?A Denial of Service (DoS) attack involves a single machine used to either target a software vulnerability or flood a targeted resource with packets, requests or queries. A DDoS attack, however, uses multiple connected devices—often executed by botnets or, on occasion, by individuals who have coordinated their activity.
What makes a DDoS attack different from a DDoS attack?A DoS attack is a denial of service attack where a computer is used to flood a server with TCP and UDP packets. A DDoS attack is where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations. All DDoS = DoS but not all DoS = DDoS.
|