quiz image

1_2_8 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - Logic Bombs

UnmatchedMandolin avatar
UnmatchedMandolin
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What type of attack occurs when a separate event triggers a logic bomb?

Logic bomb attack

In what country did a time-based logic bomb incident occur on March 19, 2013?

South Korea

What is one common trigger for a logic bomb to execute?

Turning on or off a computer

Why is it difficult to identify if a logic bomb has been placed in a system?

<p>It doesn't follow any known signature</p> Signup and view all the answers

What type of organizations in South Korea were targeted by the time-based logic bomb in 2013?

<p>Media organizations and banks</p> Signup and view all the answers

What happens to many logic bombs after they execute?

<p>They delete themselves</p> Signup and view all the answers

What type of networks were affected by the logic bomb in Ukraine on December 17th, 2016?

<p>SCADA networks</p> Signup and view all the answers

How did systems without a master boot record respond after the attack?

<p>Showing a 'boot device not found' error</p> Signup and view all the answers

What is one recommendation for preventing logic bombs from being installed?

<p>Implementing formal processes and controls for environment changes</p> Signup and view all the answers

What are SCADA networks used for?

<p>Managing electrical systems</p> Signup and view all the answers

What method can be used to detect unauthorized changes on a server?

<p>Host-based intrusion prevention</p> Signup and view all the answers

Why is it important to have constant auditing of alert systems and computer systems?

<p>To ensure authorized changes are being made</p> Signup and view all the answers

What can be a trigger for a logic bomb to execute, based on the text?

<p>Opening a specific email attachment</p> Signup and view all the answers

Why is it challenging to detect a logic bomb in a system according to the text?

<p>They delete themselves after execution</p> Signup and view all the answers

What is commonly used as a trigger for a logic bomb in addition to time-based triggers?

<p>Placing a file in a specific folder</p> Signup and view all the answers

How did the time-based logic bomb incident in South Korea on March 19, 2013, get activated?

<p>It self-activated once the date and time were reached</p> Signup and view all the answers

What can be a potential trigger for a logic bomb to execute based on the text?

<p>Placing a file in a specified folder</p> Signup and view all the answers

Why are logic bombs hard to identify with traditional security solutions according to the text?

<p>They mimic regular system activities</p> Signup and view all the answers

What effect did the logic bomb in Ukraine on December 17th, 2016, have on high voltage substations?

<p>Disabling electrical circuits and bringing down electrical connections</p> Signup and view all the answers

Why is it challenging to detect when a logic bomb has been installed in a system?

<p>There are no known signatures that can alert to the presence of a logic bomb</p> Signup and view all the answers

What type of networks were targeted by the malware customized to work with SCADA networks?

<p>Supervisory control and data acquisition networks</p> Signup and view all the answers

Why is having a formal set of processes and controls important when making changes in an environment?

<p>To deter any unauthorized modifications</p> Signup and view all the answers

What is one suggested method for detecting unauthorized changes on a server?

<p>Configuring host-based intrusion prevention</p> Signup and view all the answers

Why is constant auditing of alert systems and computer systems important?

<p>To ensure all changes are authorized and track any unauthorized attempts</p> Signup and view all the answers

More Quizzes Like This

Logic and Critical Thinking Quiz
5 questions
First-Order Logic Quiz
5 questions
Introduction to Logic and Its Concepts
10 questions
Logic and Critical Thinking
10 questions
Use Quizgecko on...
Browser
Browser