Deck 15: Types of Attacks and Malicious Software

Full screen (f)
exit full mode
Question
What is the term for when a large list of words are used to try and crack a password?

A)Dictionary attack
B)Brute-force attack
C)Hybrid attack
D)Lister crack
Use Space or
up arrow
down arrow
to flip the card.
Question
An attack that takes advantage of bugs or weaknesses in the software is referred to as what?

A)A brute-force attack
B)Software exploitation
C)A dictionary attack
D)Weakness exploitation
Question
In a ___________ attack,the attacker sends a spoofed packet to the broadcast address for a network,which distributes the packet to all systems on that network.

A)smurf
B)denial-of-service
C)viral
D)worm
Question
Making data look like it has come from a different source is called

A)Sniffing
B)A man-in-the-middle attack
C)A replay attack
D)Spoofing
Question
What is it called when a person registers a domain name,relinquishes it in less than five days,and then gets the same name again,repeating this cycle over and over again?

A)DNS spoofing
B)DNS jacking
C)DNS pilfering
D)DNS kiting
Question
SYN flooding is an example of a

A)Viral attack
B)Denial of service attack
C)Logic bomb
D)Trojan horse
Question
What is it called when an attacker makes his data look like it is coming from a different source address,and is able to intercept information transferred between two computers?

A)Spoofing
B)Man-in-the-middle attack
C)Sniffing
D)Injecting
Question
A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.

A)logic bomb
B)network sniffer
C)backdoor
D)trapdoor
Question
A(n)___________ finds weaknesses in the mechanisms surrounding the cryptography.

A)viral attack
B)worm attack
C)indirect attack
D)password attack
Question
A term used to refer to the process of taking control of an already existing session between a client and a server is

A)TCP/IP hijacking
B)Replay attacking
C)Denial-of-service attack
D)Password guessing
Question
The term ___________ refers to software that has been designed for some nefarious purpose.

A)virus
B)worm
C)Trojan horse
D)malware
Question
What is the automated downloading of malware that takes advantage of a browsers' ability to the download different files that compose a web page called?

A)Download of death
B)Trojanized download
C)Drive-by download
D)War-downloading
Question
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?

A)Software exploitation
B)Indirect attack
C)War-dialing
D)Spoofing
Question
The art of "secret writing" is called

A)Spoofing
B)Smurfing
C)Cryptography
D)Cryptanalysis
Question
What is the process of assessing the state of an organization's security compared against an established standard called?

A)Pen testing
B)Auditing
C)Vulnerability testing
D)Accounting
Question
Bob gets an e-mail addressed from his bank,asking for his user ID and password.He then notices that the e-mail has poor grammar and incorrect spelling.He calls up his bank to ask if they sent the e-mail,and they promptly tell him they did not and would not ask for that kind of information.What is this type of attack called?

A)Phishing
B)Pharming
C)Spear pharming
D)Spishing
Question
In a ______________,a password cracking program attempts all possible password combinations.

A)brute-force attack
B)dictionary attack
C)man-in-the-middle attack
D)replay attack
Question
The activity where hackers wander throughout an area with a computer with wireless capability,searching for wireless networks they can access is referred to as which of the following?

A)War-driving
B)War-dialing
C)Indirect attack
D)Brute force attack
Question
An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a(n)___________ attack.

A)smurf
B)denial-of-service
C)viral
D)replay
Question
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

A)Social engineering
B)User exploitation
C)War-driving
D)Indirect attack
Question
The term _______________ is used to refer to programs that attackers install after gaining unauthorized access to a system,ensuring that they can continue to have unrestricted access to the system,even if their initial access method is discovered and blocked.
Question
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
Question
Malicious code that sits dormant until a particular event occurs to release its payload is called what?

A)Trojan
B)Logic bomb
C)Trigger virus
D)Logic worm
Question
An attacker will do reconnaissance by going to public sites like SEC.gov and whois.net to get important information that can be used in an attack.
Question
_______________ is a situation where someone examines all the network traffic that passes their NIC,whether addressed for them or not.
Question
Attacks on computer systems can be grouped into two broad categories: attacks on specific software,and attacks on a specific protocol or service.
Question
The ping of death is a type of distributed denial of service.
Question
A birthday attack is a type of logic bomb virus that releases its payload on some famous person's birthday,such as Michelangelo.
Question
Defense begins by eliminating threats.
Question
A syn flood is type of spam that floods the inbox with pornographic material.
Question
A(n)_______________ attack is an attack designed to prevent a system or service from functioning normally.
Question
When an attacker purposely sends more data for input that the program was designed to handle and it results in a system crash,what is this an example of?

A)Syn flood
B)Buffer overflow
C)Incomplete mediation
D)Logic bomb
Question
What is the term for malware that changes the way the operating system functions to avoid detection?

A)Rootkit
B)Boot sector virus
C)Spyware
D)Dieware
Question
Johnny received a "new version" of the game Solitaire in an e-mail.After running the program,a backdoor was installed on his computer without his knowledge.What kind of an attack is this?

A)Logic bomb
B)Hoax
C)Trojan
D)Worm
Question
A(n)_______________ is a connection to a Windows interprocess communications share (IPC$).
Question
What is software that records and reports activities of the user (typically without their knowledge)called?

A)Snoopware
B)Malware
C)Spyware
D)Eyeware
Question
A computer system is attacked for one of two reasons: it is specifically targeted by the attacker,or it is a target of opportunity.
Question
The last step in minimizing possible avenues of attack is updating system patches.
Question
A(n)_______________ is a 32-bit number established by the host that is incremented for each packet sent.
Question
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.
Question
TCP/IP hijacking and _______________ are terms used to refer to the process of taking control of an already existing session between a client and a server.
Question
What should be included in a security audit?
Question
How can social engineering be used to gain access to a computer network and what is the best way to prevent it from happening?
Question
A(n)_______________ occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time.
Question
_______________ is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users.
Question
List and describe the steps a hacker takes to attack a network.
Question
Describe some of the types of attacks that can be launched against a network.
Question
List and describe various types of malware.
Question
_______________ is an economic attack against the terms of using a new DNS entry.
Question
A _______________ occurs when a program is provided more data for input than it was designed to handle.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Types of Attacks and Malicious Software
1
What is the term for when a large list of words are used to try and crack a password?

A)Dictionary attack
B)Brute-force attack
C)Hybrid attack
D)Lister crack
A
2
An attack that takes advantage of bugs or weaknesses in the software is referred to as what?

A)A brute-force attack
B)Software exploitation
C)A dictionary attack
D)Weakness exploitation
B
3
In a ___________ attack,the attacker sends a spoofed packet to the broadcast address for a network,which distributes the packet to all systems on that network.

A)smurf
B)denial-of-service
C)viral
D)worm
A
4
Making data look like it has come from a different source is called

A)Sniffing
B)A man-in-the-middle attack
C)A replay attack
D)Spoofing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What is it called when a person registers a domain name,relinquishes it in less than five days,and then gets the same name again,repeating this cycle over and over again?

A)DNS spoofing
B)DNS jacking
C)DNS pilfering
D)DNS kiting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
SYN flooding is an example of a

A)Viral attack
B)Denial of service attack
C)Logic bomb
D)Trojan horse
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is it called when an attacker makes his data look like it is coming from a different source address,and is able to intercept information transferred between two computers?

A)Spoofing
B)Man-in-the-middle attack
C)Sniffing
D)Injecting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.

A)logic bomb
B)network sniffer
C)backdoor
D)trapdoor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A(n)___________ finds weaknesses in the mechanisms surrounding the cryptography.

A)viral attack
B)worm attack
C)indirect attack
D)password attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
A term used to refer to the process of taking control of an already existing session between a client and a server is

A)TCP/IP hijacking
B)Replay attacking
C)Denial-of-service attack
D)Password guessing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The term ___________ refers to software that has been designed for some nefarious purpose.

A)virus
B)worm
C)Trojan horse
D)malware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What is the automated downloading of malware that takes advantage of a browsers' ability to the download different files that compose a web page called?

A)Download of death
B)Trojanized download
C)Drive-by download
D)War-downloading
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?

A)Software exploitation
B)Indirect attack
C)War-dialing
D)Spoofing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The art of "secret writing" is called

A)Spoofing
B)Smurfing
C)Cryptography
D)Cryptanalysis
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What is the process of assessing the state of an organization's security compared against an established standard called?

A)Pen testing
B)Auditing
C)Vulnerability testing
D)Accounting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Bob gets an e-mail addressed from his bank,asking for his user ID and password.He then notices that the e-mail has poor grammar and incorrect spelling.He calls up his bank to ask if they sent the e-mail,and they promptly tell him they did not and would not ask for that kind of information.What is this type of attack called?

A)Phishing
B)Pharming
C)Spear pharming
D)Spishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
In a ______________,a password cracking program attempts all possible password combinations.

A)brute-force attack
B)dictionary attack
C)man-in-the-middle attack
D)replay attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The activity where hackers wander throughout an area with a computer with wireless capability,searching for wireless networks they can access is referred to as which of the following?

A)War-driving
B)War-dialing
C)Indirect attack
D)Brute force attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a(n)___________ attack.

A)smurf
B)denial-of-service
C)viral
D)replay
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

A)Social engineering
B)User exploitation
C)War-driving
D)Indirect attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The term _______________ is used to refer to programs that attackers install after gaining unauthorized access to a system,ensuring that they can continue to have unrestricted access to the system,even if their initial access method is discovered and blocked.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Malicious code that sits dormant until a particular event occurs to release its payload is called what?

A)Trojan
B)Logic bomb
C)Trigger virus
D)Logic worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
An attacker will do reconnaissance by going to public sites like SEC.gov and whois.net to get important information that can be used in an attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
_______________ is a situation where someone examines all the network traffic that passes their NIC,whether addressed for them or not.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Attacks on computer systems can be grouped into two broad categories: attacks on specific software,and attacks on a specific protocol or service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The ping of death is a type of distributed denial of service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A birthday attack is a type of logic bomb virus that releases its payload on some famous person's birthday,such as Michelangelo.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Defense begins by eliminating threats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A syn flood is type of spam that floods the inbox with pornographic material.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A(n)_______________ attack is an attack designed to prevent a system or service from functioning normally.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
When an attacker purposely sends more data for input that the program was designed to handle and it results in a system crash,what is this an example of?

A)Syn flood
B)Buffer overflow
C)Incomplete mediation
D)Logic bomb
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What is the term for malware that changes the way the operating system functions to avoid detection?

A)Rootkit
B)Boot sector virus
C)Spyware
D)Dieware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Johnny received a "new version" of the game Solitaire in an e-mail.After running the program,a backdoor was installed on his computer without his knowledge.What kind of an attack is this?

A)Logic bomb
B)Hoax
C)Trojan
D)Worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A(n)_______________ is a connection to a Windows interprocess communications share (IPC$).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What is software that records and reports activities of the user (typically without their knowledge)called?

A)Snoopware
B)Malware
C)Spyware
D)Eyeware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A computer system is attacked for one of two reasons: it is specifically targeted by the attacker,or it is a target of opportunity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The last step in minimizing possible avenues of attack is updating system patches.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)_______________ is a 32-bit number established by the host that is incremented for each packet sent.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
TCP/IP hijacking and _______________ are terms used to refer to the process of taking control of an already existing session between a client and a server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What should be included in a security audit?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How can social engineering be used to gain access to a computer network and what is the best way to prevent it from happening?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
A(n)_______________ occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
_______________ is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List and describe the steps a hacker takes to attack a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe some of the types of attacks that can be launched against a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List and describe various types of malware.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
_______________ is an economic attack against the terms of using a new DNS entry.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
A _______________ occurs when a program is provided more data for input than it was designed to handle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.