Deck 15: Types of Attacks and Malicious Software
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 15: Types of Attacks and Malicious Software
1
What is the term for when a large list of words are used to try and crack a password?
A)Dictionary attack
B)Brute-force attack
C)Hybrid attack
D)Lister crack
A)Dictionary attack
B)Brute-force attack
C)Hybrid attack
D)Lister crack
A
2
An attack that takes advantage of bugs or weaknesses in the software is referred to as what?
A)A brute-force attack
B)Software exploitation
C)A dictionary attack
D)Weakness exploitation
A)A brute-force attack
B)Software exploitation
C)A dictionary attack
D)Weakness exploitation
B
3
In a ___________ attack,the attacker sends a spoofed packet to the broadcast address for a network,which distributes the packet to all systems on that network.
A)smurf
B)denial-of-service
C)viral
D)worm
A)smurf
B)denial-of-service
C)viral
D)worm
A
4
Making data look like it has come from a different source is called
A)Sniffing
B)A man-in-the-middle attack
C)A replay attack
D)Spoofing
A)Sniffing
B)A man-in-the-middle attack
C)A replay attack
D)Spoofing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What is it called when a person registers a domain name,relinquishes it in less than five days,and then gets the same name again,repeating this cycle over and over again?
A)DNS spoofing
B)DNS jacking
C)DNS pilfering
D)DNS kiting
A)DNS spoofing
B)DNS jacking
C)DNS pilfering
D)DNS kiting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
SYN flooding is an example of a
A)Viral attack
B)Denial of service attack
C)Logic bomb
D)Trojan horse
A)Viral attack
B)Denial of service attack
C)Logic bomb
D)Trojan horse
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is it called when an attacker makes his data look like it is coming from a different source address,and is able to intercept information transferred between two computers?
A)Spoofing
B)Man-in-the-middle attack
C)Sniffing
D)Injecting
A)Spoofing
B)Man-in-the-middle attack
C)Sniffing
D)Injecting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.
A)logic bomb
B)network sniffer
C)backdoor
D)trapdoor
A)logic bomb
B)network sniffer
C)backdoor
D)trapdoor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A(n)___________ finds weaknesses in the mechanisms surrounding the cryptography.
A)viral attack
B)worm attack
C)indirect attack
D)password attack
A)viral attack
B)worm attack
C)indirect attack
D)password attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
A term used to refer to the process of taking control of an already existing session between a client and a server is
A)TCP/IP hijacking
B)Replay attacking
C)Denial-of-service attack
D)Password guessing
A)TCP/IP hijacking
B)Replay attacking
C)Denial-of-service attack
D)Password guessing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The term ___________ refers to software that has been designed for some nefarious purpose.
A)virus
B)worm
C)Trojan horse
D)malware
A)virus
B)worm
C)Trojan horse
D)malware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What is the automated downloading of malware that takes advantage of a browsers' ability to the download different files that compose a web page called?
A)Download of death
B)Trojanized download
C)Drive-by download
D)War-downloading
A)Download of death
B)Trojanized download
C)Drive-by download
D)War-downloading
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?
A)Software exploitation
B)Indirect attack
C)War-dialing
D)Spoofing
A)Software exploitation
B)Indirect attack
C)War-dialing
D)Spoofing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The art of "secret writing" is called
A)Spoofing
B)Smurfing
C)Cryptography
D)Cryptanalysis
A)Spoofing
B)Smurfing
C)Cryptography
D)Cryptanalysis
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What is the process of assessing the state of an organization's security compared against an established standard called?
A)Pen testing
B)Auditing
C)Vulnerability testing
D)Accounting
A)Pen testing
B)Auditing
C)Vulnerability testing
D)Accounting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Bob gets an e-mail addressed from his bank,asking for his user ID and password.He then notices that the e-mail has poor grammar and incorrect spelling.He calls up his bank to ask if they sent the e-mail,and they promptly tell him they did not and would not ask for that kind of information.What is this type of attack called?
A)Phishing
B)Pharming
C)Spear pharming
D)Spishing
A)Phishing
B)Pharming
C)Spear pharming
D)Spishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
In a ______________,a password cracking program attempts all possible password combinations.
A)brute-force attack
B)dictionary attack
C)man-in-the-middle attack
D)replay attack
A)brute-force attack
B)dictionary attack
C)man-in-the-middle attack
D)replay attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The activity where hackers wander throughout an area with a computer with wireless capability,searching for wireless networks they can access is referred to as which of the following?
A)War-driving
B)War-dialing
C)Indirect attack
D)Brute force attack
A)War-driving
B)War-dialing
C)Indirect attack
D)Brute force attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a(n)___________ attack.
A)smurf
B)denial-of-service
C)viral
D)replay
A)smurf
B)denial-of-service
C)viral
D)replay
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.
A)Social engineering
B)User exploitation
C)War-driving
D)Indirect attack
A)Social engineering
B)User exploitation
C)War-driving
D)Indirect attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The term _______________ is used to refer to programs that attackers install after gaining unauthorized access to a system,ensuring that they can continue to have unrestricted access to the system,even if their initial access method is discovered and blocked.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Malicious code that sits dormant until a particular event occurs to release its payload is called what?
A)Trojan
B)Logic bomb
C)Trigger virus
D)Logic worm
A)Trojan
B)Logic bomb
C)Trigger virus
D)Logic worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
An attacker will do reconnaissance by going to public sites like SEC.gov and whois.net to get important information that can be used in an attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
_______________ is a situation where someone examines all the network traffic that passes their NIC,whether addressed for them or not.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Attacks on computer systems can be grouped into two broad categories: attacks on specific software,and attacks on a specific protocol or service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The ping of death is a type of distributed denial of service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A birthday attack is a type of logic bomb virus that releases its payload on some famous person's birthday,such as Michelangelo.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Defense begins by eliminating threats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A syn flood is type of spam that floods the inbox with pornographic material.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A(n)_______________ attack is an attack designed to prevent a system or service from functioning normally.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
When an attacker purposely sends more data for input that the program was designed to handle and it results in a system crash,what is this an example of?
A)Syn flood
B)Buffer overflow
C)Incomplete mediation
D)Logic bomb
A)Syn flood
B)Buffer overflow
C)Incomplete mediation
D)Logic bomb
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What is the term for malware that changes the way the operating system functions to avoid detection?
A)Rootkit
B)Boot sector virus
C)Spyware
D)Dieware
A)Rootkit
B)Boot sector virus
C)Spyware
D)Dieware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Johnny received a "new version" of the game Solitaire in an e-mail.After running the program,a backdoor was installed on his computer without his knowledge.What kind of an attack is this?
A)Logic bomb
B)Hoax
C)Trojan
D)Worm
A)Logic bomb
B)Hoax
C)Trojan
D)Worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A(n)_______________ is a connection to a Windows interprocess communications share (IPC$).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What is software that records and reports activities of the user (typically without their knowledge)called?
A)Snoopware
B)Malware
C)Spyware
D)Eyeware
A)Snoopware
B)Malware
C)Spyware
D)Eyeware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A computer system is attacked for one of two reasons: it is specifically targeted by the attacker,or it is a target of opportunity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The last step in minimizing possible avenues of attack is updating system patches.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)_______________ is a 32-bit number established by the host that is incremented for each packet sent.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
TCP/IP hijacking and _______________ are terms used to refer to the process of taking control of an already existing session between a client and a server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What should be included in a security audit?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How can social engineering be used to gain access to a computer network and what is the best way to prevent it from happening?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
A(n)_______________ occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
_______________ is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List and describe the steps a hacker takes to attack a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe some of the types of attacks that can be launched against a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List and describe various types of malware.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
_______________ is an economic attack against the terms of using a new DNS entry.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
A _______________ occurs when a program is provided more data for input than it was designed to handle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck