Exam 3: Network and Computer Attacks
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?
(Multiple Choice)
4.8/5
(26)
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?
(Multiple Choice)
4.7/5
(30)
When a computer hacker uses multiple compromised computers to carry out a DDOS attack,the compromised computers are usually referred to as which of the following?
(Multiple Choice)
4.9/5
(33)
Whitelisting allows only approved programs to run on a computer.
(True/False)
4.9/5
(36)
Match each item with a statement below.
-A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
(Multiple Choice)
4.9/5
(32)
Match each item with a statement below.
-Attackers inject themselves between two parties or systems communicating with one another
(Multiple Choice)
4.8/5
(38)
Match each item with a statement below.
-Malicious program that attaches itself to a file or another program
(Multiple Choice)
4.9/5
(35)
A DDoS attack is launched against a host from a single server or workstation.
(True/False)
4.9/5
(43)
A computer hacker may use a phishing e-mail to lure a user into following a malicious link.What type of technique is being used by the computer hacker?
(Multiple Choice)
4.7/5
(35)
Match each item with a statement below.
-Hardware devices or software that can be used to capture keystrokes on a computer
(Multiple Choice)
4.9/5
(40)
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
(Multiple Choice)
4.7/5
(35)
What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?
(Multiple Choice)
4.9/5
(32)
The virus signature file is maintained by what type of software?
(Multiple Choice)
4.8/5
(32)
Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?
(Multiple Choice)
4.9/5
(31)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)