Chapter 2 Cisco quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which two characteristics describe a worm? (Choose two)

1. is self-replicating 2.travels to new computers without any intervention or knowledge of the user

Which example illustrates how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware

Which tool is used to provide a list of open ports on network devices

Nmap

In what way are zombies used in security attacks?

They are infected machines that carry out a DDoS attack

Which type of attack allows an attacker to use a brute force approach?

password cracking

What is the purpose of a rootkit?

to gain privileged access to a device while concealing itself

What is the most common goal of search engine optimization (SEO) poisoning?

to increase web traffic to malicious sites

What is the primary goal of a DoS attack?

to prevent the target server from being able to handle additional requests


Conjuntos de estudio relacionados

Manufacturing Processes: Machining Operations and Machine Tools (CH. 21)

View Set

ECON 201 Module 1 SG with PPT Slides for 1 and 2

View Set

Cultural Anthropology Chapter 9 Review Quiz (Kinship, Family, and Marriage)

View Set

Chapter 40: Respiratory Dysfunction NCLEX

View Set

CFA Level 1 - Financial Reporting & Analysis

View Set

PN Nursing Care of Children Online Practice 2020 B with NGN

View Set