Exam 3: Network and Computer Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is created after an attack and usually hides within the OS tools,so it is almost impossible to detect?

Free
(Multiple Choice)
4.9/5
(25)
Correct Answer:
Verified

B

Malware programs cannot be detected by antivirus programs.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

False

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
Verified

C

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

(Multiple Choice)
4.8/5
(39)

When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

(Multiple Choice)
4.8/5
(29)

In a buffer overflow attack,an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

(True/False)
4.8/5
(39)

If an attacker wishes to collect confidential financial data,passwords,PINs and any personal data stored on your computer which of the following programs would they choose to use?

(Multiple Choice)
4.9/5
(32)

Which of the following sometimes displays a banner that notifies the user of its presence?

(Multiple Choice)
4.9/5
(39)

What type of malicious computer programs present themselves as useful computer programs or applications?

(Multiple Choice)
4.8/5
(28)

Match each item with a statement below. -An attack that prevents legitimate users from accessing network resources

(Multiple Choice)
4.9/5
(36)

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

(Multiple Choice)
4.9/5
(31)

How does a buffer overflow attack work?

(Essay)
4.9/5
(40)

Match each item with a statement below. -An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction

(Multiple Choice)
4.7/5
(29)

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

(Multiple Choice)
4.9/5
(37)

Explain how a basic computer virus operates and how it uses other host programs.

(Essay)
4.7/5
(31)

Which type of program can mitigate some risks associated with malware?

(Multiple Choice)
4.7/5
(35)

What type of virus is used to lock a user's system,or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

(Multiple Choice)
4.8/5
(34)

The acronym IDS stands for which of the following?

(Multiple Choice)
4.8/5
(36)

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

(Multiple Choice)
4.8/5
(34)

Explain the advantages of application whitelisting?

(Essay)
4.9/5
(30)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)