Exam 3: Network and Computer Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.

(Multiple Choice)
4.9/5
(33)

MATCHING Match each term with the correct statement below. -attack side of a sophisticated cybercrime toolkit that spreads when Web surfers visit a hacked Web site hosting the malware

(Multiple Choice)
4.7/5
(32)

A(n) ____________________ is a virus encoded as a macro in programs that support a macro programming language, such as Visual Basic for Applications (VBA).

(Short Answer)
4.8/5
(35)

Which of the following provides the most secure method of securing a company's assets?

(Multiple Choice)
4.7/5
(28)

____ enables an attacker to join a TCP session and make both parties think he or she is the other party.

(Multiple Choice)
4.8/5
(27)

In a ____ attack, a programmer finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

(Multiple Choice)
4.9/5
(38)

MATCHING Match each term with the correct statement below. -hardware keylogger

(Multiple Choice)
4.8/5
(35)

MATCHING Match each term with the correct statement below. -common Trojan program

(Multiple Choice)
4.8/5
(45)

____________________ is malicious software, such as a virus,worm, or Trojan program, introduced to a network for just that reason.

(Short Answer)
4.8/5
(32)

What is the most important recommendation that should be made to a client to help prevent viruses from being introduced into corporate networks?

(Essay)
4.8/5
(37)

____ is a remote control program.

(Multiple Choice)
4.7/5
(44)

A ____ can replicate itself, usually through an executable program attached to an e-mail.

(Multiple Choice)
4.8/5
(40)

To represent 0 to 63 characters you need only ____ bits.

(Multiple Choice)
4.9/5
(31)

Trojan Programs can install a backdoor or ____ on a computer.

(Multiple Choice)
4.9/5
(34)

One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.

(Multiple Choice)
4.9/5
(33)

____ commands that open and close files can be used in destructive ways.

(Multiple Choice)
4.7/5
(37)

____ sometimes displays a banner that notifies the user of its presence.

(Multiple Choice)
4.8/5
(31)

MATCHING Match each term with the correct statement below. -most infamous macro virus

(Multiple Choice)
4.9/5
(33)

What is a DDoS attack?

(Essay)
4.8/5
(30)

In the ____ attack, the attacker simply creates an ICMP packet that's larger than the maximum allowed 65,535 bytes.

(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)