What is the major difference between a virus and a worm?
Viruses and worms both travel from system to system attempting to deliver their malicious payloads to as many machines as possible.
However, viruses require some sort of human intervention, such as sharing a file, network resource, or email message, to propagate.
Worms, on the other hand, seek out vulnerabilities and spread from system to system under their own power, thereby greatly magnifying their reproductive capability, especially in a well-connected network.
Explain the four propagation methods used by Robert Tappan Morris’s Internet Worm.
The Internet Worm used four propagation techniques.
First, it exploited a bug in the sendmail utility that allowed it to spread itself by sending a specially crafted email message that contained its code to the sendmail program on a remote system.
Second, it used a dictionary-based password attack to attempt to gain access to remote systems by utilizing the username and password of a valid system user.
Third, it exploited a buffer overflow vulnerability in the finger program to infect systems.
Fourth, it analyzed any existing trust relationships with other systems on the network and attempted to spread itself to those systems through the trusted path.
What are the actions an antivirus software package might take when it discovers an infected file?
If possible, antivirus software may try to disinfect an infected file, removing the virus’s malicious code.
If that fails, it might either quarantine the file for manual review or automatically delete it to prevent further infection.
Explain how a data integrity assurance package like Tripwire provides some secondary virus detection capabilities.
Data integrity assurance packages like Tripwire compute hash values for each file stored on a protected system.
If a file infector virus strikes the system, this would result in a change in the affected file’s hash value and would, therefore, trigger a file integrity alert.
A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction
A. Internet
B. DMZ
C. Intranet
D. Sandbox
A. Smurf
B. TOCTTOU
C. Land
D. Fraggle
A. Sandboxing
B. Control signing
C. Integrity monitoring
D. Whitelisting
A. Polymorphism
B. Stealth
C. Encryption
D. Multipartitism
A. LastPass
B. Crack
C. Shadow password files
D. Tripwire
A. Rootkit
B. Back door
C. TOC/TOU
D. Buffer overflow
A. mike
B. elppa
C. dayorange
D. fsasoalg
A. /etc/passwd
B. /etc/shadow
C. /etc/security
D. /etc/pwlog
A. !
B. &
C. *
D. ‘
A. Triggers
B. Stored procedures
C. Column encryption
D. Concurrency control
A. Session hijacking
B. Port scan
C. Dumpster diving
D. IP sweep
A. Reflected input
B. Database-driven content
C. .NET technology
D. CGI scripts
A. Stealth virus
B. Companion virus
C. Polymorphic virus
D. Multipartite virus
A. Limiting account privileges
B. Input validation
C. User authentication
D. Encryption
A. Stuxnet
B. Code Red
C. Melissa
D. rtm
A. Escalation of privilege
B. Back door
C. Rootkit
D. Buffer overflow
A. Confidentiality
B. Encryption
C. Stealth
D. Sandbox
A. “H1”
B. “HEAD”
C. “XSS”
D. “SCRIPT”
A. Packets with internal source IP addresses don’t enter the network from the outside.
B. Packets with internal source IP addresses don’t exit the network from the inside.
C. Packets with public IP addresses don’t pass through the router in either direction.
D. Packets with external source IP addresses don’t enter the network from the outside.