Sophos Threats urus question and answers graded A+ 2023
Sophos Threats urus question and answers graded A+ 2023Advanced Persistent Threat (APT) - correct answer Type of targeted attack, characterized by an attacker who has time and resources to plan an infiltration into a network. These attackers actively manage their attack once they have a foothold in a network and are usually seeking information, proprietary or economic, rather than simple financial data. APTs are persistent in that the attackers may remain on a network for some time. APTs should not be confused with botnets, which are usually opportunistic and indiscriminate attacks seeking any available victim rather than specific information. Adware - correct answer Software that displays advertisements on your computer. Displays advertising banners or pop-ups on your computer when you use an application. This is not necessarily a bad thing. Such advertising can fund the development of useful software, which is then distributed free (for example, Android apps and browser toolbars, many of which are adware funded). This becomes a problem if it: installs itself on your computer without your consent installs itself in applications other than the one it came with and displays advertising when you use those applications hijacks your web browser in order to display more ads (see Browser hijacker) gathers data on your web browsing without your consent and sends it to others via the Internet (see Spyware) is designed to be difficult to uninstall Adware can slow down your PC. It can also slow down your Internet connection by downloading advertisements. Sometimes programming flaws in the adware can make your computer unstable. Some antivirus programs detect adware and report it as potentially unwanted applications. You can then either authorize the adware program or remove it from your computer. There are also dedicated programs for detecting adware. Anonymizing proxy - correct answer Allow the user to hide their web browsing activity. They are often used to bypass web security filters—e.g., to access blocked sites from a work computer. Anonymizing proxies hold security and liability risks for organizations: Security: The anonymizing proxy bypasses web security and allows users to access unauthorized webpages Liability: Organizations can be legally liable if their computers are used to view pornography, hate material or to incite illegal behavior. There are also ramifications if users violate third-party licenses through illegal MP3, film and software downloads Autorun worm - correct answer Malicious programs that take advantage of the Windows AutoRun feature. They execute automatically when the device on which they are stored is plugged into a computer. Are commonly distributed on USB drives, automatically infecting computers as soon as the USB is plugged in. AutoPlay is a similar technology to AutoRun. It is initiated on removable media prompting users to choose to listen to music with the default media player, or to open the disk in Windows Explorer. Attackers have similarly exploited AutoPlay, most famously via the Conficker worm.
Escuela, estudio y materia
- Institución
- Sophos
- Grado
- Sophos
Información del documento
- Subido en
- 22 de julio de 2023
- Número de páginas
- 16
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
- adware
- anonymizing proxy
-
sophos threats urus question and answers graded a
-
advanced persistent threat apt
Documento también disponible en un lote