Exam 3: Network and Computer Attacks
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.
(Multiple Choice)
4.9/5
(33)
MATCHING
Match each term with the correct statement below.
-attack side of a sophisticated cybercrime toolkit that spreads when Web surfers visit a hacked Web site hosting the malware
(Multiple Choice)
4.7/5
(32)
A(n) ____________________ is a virus encoded as a macro in programs that support a macro programming language, such as Visual Basic for Applications (VBA).
(Short Answer)
4.8/5
(35)
Which of the following provides the most secure method of securing a company's assets?
(Multiple Choice)
4.7/5
(28)
____ enables an attacker to join a TCP session and make both parties think he or she is the other party.
(Multiple Choice)
4.8/5
(27)
In a ____ attack, a programmer finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.
(Multiple Choice)
4.9/5
(38)
MATCHING
Match each term with the correct statement below.
-hardware keylogger
(Multiple Choice)
4.8/5
(35)
MATCHING
Match each term with the correct statement below.
-common Trojan program
(Multiple Choice)
4.8/5
(45)
____________________ is malicious software, such as a virus,worm, or Trojan program, introduced to a network for just that reason.
(Short Answer)
4.8/5
(32)
What is the most important recommendation that should be made to a client to help prevent viruses from being introduced into corporate networks?
(Essay)
4.8/5
(37)
A ____ can replicate itself, usually through an executable program attached to an e-mail.
(Multiple Choice)
4.8/5
(40)
Trojan Programs can install a backdoor or ____ on a computer.
(Multiple Choice)
4.9/5
(34)
One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.
(Multiple Choice)
4.9/5
(33)
____ commands that open and close files can be used in destructive ways.
(Multiple Choice)
4.7/5
(37)
____ sometimes displays a banner that notifies the user of its presence.
(Multiple Choice)
4.8/5
(31)
MATCHING
Match each term with the correct statement below.
-most infamous macro virus
(Multiple Choice)
4.9/5
(33)
In the ____ attack, the attacker simply creates an ICMP packet that's larger than the maximum allowed 65,535 bytes.
(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)