Exam 3: Network and Computer Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What types of ports do successful Trojan programs commonly use?

(Essay)
4.8/5
(31)

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

(Multiple Choice)
4.7/5
(35)

Match each item with a statement below. -Network of robot computers

(Multiple Choice)
4.8/5
(35)

Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

(Multiple Choice)
4.7/5
(29)

Malware is malicious software,such as a virus,worm,or Trojan program,introduced into a network.

(True/False)
4.9/5
(36)

What type of attack causes the victim's computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

(Multiple Choice)
4.8/5
(38)

Match each item with a statement below. -A program that usually hides in the OS tools,so it's almost impossible to detect

(Multiple Choice)
4.8/5
(43)

Match each item with a statement below. -Malicious software introduced into a network to help an attacker accomplish their goals

(Multiple Choice)
4.9/5
(31)

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later.What means of access is the attacker utilizing?

(Multiple Choice)
4.9/5
(39)

Match each item with a statement below. -Virus that locks a target system until a demanded fee is paid

(Multiple Choice)
4.8/5
(39)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)