Exam 2: Types of Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which is NOT true about a buffer overflow attack?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

A program that self-replicates is,by definition,called a(n)____________.

Free
(Short Answer)
4.7/5
(29)
Correct Answer:
Verified

virus

Which of the following activities do security professionals recommend to limit the chances of becoming a target for a Trojan horse?

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

B

Which is NOT a typical adverse result of a virus?

(Multiple Choice)
4.9/5
(31)

Which of the following is NOT a denial of service attack?

(Multiple Choice)
4.8/5
(31)

Which created a domestic "cyber terrorism" attack against a Unix distributor?

(Multiple Choice)
5.0/5
(27)

Configuring routers to not forward directed broadcast packets can help defend against a ____________ attack.

(Short Answer)
5.0/5
(39)

Which method of defense against a SYN flood involves altering the response timeout?

(Multiple Choice)
4.8/5
(41)

A Distributed Reflection DoS attack takes advantage of the fact that most Internet routers communicate on port ____________.

(Short Answer)
4.9/5
(40)

What do many analysts believe was the reason for the MyDoom virus\worm?

(Multiple Choice)
4.9/5
(31)

Shutting down router and firewall ports 5554 and 9996 will block most damage from which of these?

(Multiple Choice)
4.8/5
(33)

Which attack causes Internet routers to attack the target systems without actually compromising the routers themselves?

(Multiple Choice)
4.8/5
(35)

One of the most common types of attacks via the Internet is:

(Multiple Choice)
4.8/5
(31)

Which presented itself as an e-mail from the system administrator informing the user of a virus infection and gave directions to open an e-mail attachment which would then scan for e-mail addresses and shared folders?

(Multiple Choice)
5.0/5
(33)

The spread of viruses can be minimized by all of the following EXCEPT:

(Multiple Choice)
4.8/5
(30)

A ____________ can help reduce system vulnerability by preventing disclosure of IP addresses much like a firewall.

(Short Answer)
4.7/5
(36)

Which of the following denial of service attacks results from a client's failure to respond to the server's reply to a request for connection?

(Multiple Choice)
4.9/5
(43)

Which copies itself into the Windows directory and creates a registry key to load itself at startup?

(Multiple Choice)
4.8/5
(33)

Which created a buffer overflow attack against a Windows flaw called the DCOM RPC vulnerability?

(Multiple Choice)
5.0/5
(40)

The Distributed Denial of Service attack initiated by the ____________ worm is considered by many to be a clear example of cyber-terrorism.

(Short Answer)
4.9/5
(41)
Showing 1 - 20 of 27
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)