Exam 3: Network and Computer Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

(Multiple Choice)
4.8/5
(26)

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

(Multiple Choice)
4.7/5
(30)

When a computer hacker uses multiple compromised computers to carry out a DDOS attack,the compromised computers are usually referred to as which of the following?

(Multiple Choice)
4.9/5
(33)

Whitelisting allows only approved programs to run on a computer.

(True/False)
4.9/5
(36)

Match each item with a statement below. -A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer

(Multiple Choice)
4.9/5
(32)

What is spyware and how does it operate?

(Essay)
4.8/5
(36)

Match each item with a statement below. -Attackers inject themselves between two parties or systems communicating with one another

(Multiple Choice)
4.8/5
(38)

What is a DDoS attack?

(Essay)
4.8/5
(29)

Match each item with a statement below. -Malicious program that attaches itself to a file or another program

(Multiple Choice)
4.9/5
(35)

Describe the basic function and creation process of a macro virus.

(Essay)
4.9/5
(34)

A DDoS attack is launched against a host from a single server or workstation.

(True/False)
4.9/5
(43)

A computer hacker may use a phishing e-mail to lure a user into following a malicious link.What type of technique is being used by the computer hacker?

(Multiple Choice)
4.7/5
(35)

Match each item with a statement below. -Hardware devices or software that can be used to capture keystrokes on a computer

(Multiple Choice)
4.9/5
(40)

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

(Multiple Choice)
4.7/5
(35)

What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

(Multiple Choice)
4.9/5
(32)

The virus signature file is maintained by what type of software?

(Multiple Choice)
4.8/5
(32)

Explain how the two different types of keyloggers are used?

(Essay)
5.0/5
(28)

Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

(Multiple Choice)
4.9/5
(31)

How do Trojan programs operate?

(Essay)
4.8/5
(43)

What is the difference between spyware and adware?

(Essay)
4.7/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)