Exam 3: Network and Computer Attacks
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Which of the following is created after an attack and usually hides within the OS tools,so it is almost impossible to detect?
Free
(Multiple Choice)
4.9/5
(25)
Correct Answer:
B
Malware programs cannot be detected by antivirus programs.
Free
(True/False)
4.9/5
(36)
Correct Answer:
False
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
C
Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?
(Multiple Choice)
4.8/5
(39)
When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?
(Multiple Choice)
4.8/5
(29)
In a buffer overflow attack,an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.
(True/False)
4.8/5
(39)
If an attacker wishes to collect confidential financial data,passwords,PINs and any personal data stored on your computer which of the following programs would they choose to use?
(Multiple Choice)
4.9/5
(32)
Which of the following sometimes displays a banner that notifies the user of its presence?
(Multiple Choice)
4.9/5
(39)
What type of malicious computer programs present themselves as useful computer programs or applications?
(Multiple Choice)
4.8/5
(28)
Match each item with a statement below.
-An attack that prevents legitimate users from accessing network resources
(Multiple Choice)
4.9/5
(36)
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below.
-An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
(Multiple Choice)
4.7/5
(29)
Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?
(Multiple Choice)
4.9/5
(37)
Explain how a basic computer virus operates and how it uses other host programs.
(Essay)
4.7/5
(31)
Which type of program can mitigate some risks associated with malware?
(Multiple Choice)
4.7/5
(35)
What type of virus is used to lock a user's system,or cloud accounts until the system's owner complies by paying the attacker a monetary fee?
(Multiple Choice)
4.8/5
(34)
Which type of attack cripples the network and prevents legitimate users from accessing network resources?
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)