Multiple Choice
Zombies are
A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
Correct Answer:

Verified
Correct Answer:
Verified
Q1: A buffer overflow vulnerability refers to a
Q2: Relative to physical security, information security is
Q3: Vulnerabilities in IT systems can be eliminated
Q4: Malware refers to<br>A) Programs that propagate through
Q5: Denial of service refers to<br>A) Programs that
Q7: Assets are<br>A) Resources or information that is
Q8: The NVD database<br>A) Describes likely impacts and
Q9: A cross-site scripting vulnerability can occur when<br>A)
Q10: Physical controls<br>A) Use non-technical methods of preventing
Q11: Threats are<br>A) Safeguards used to minimize the