Cisco Intro to Cybersecurity Chapter 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which example illustrates how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

Which tool is used to provide a list of open ports on network devices?

Nmap

Which type of attack allows an attacker to use a brute force approach?

Password Cracking

In what way are zombies used in security attacks?

They are infected machines that carry out a DDoS attack.

What is the purpose of a rootkit?

to gain privileged access to a device while concealing itself

What is the most common goal of search engine optimization (SEO) poisoning?

to increase web traffic to malicious sites

What is the primary goal of a DoS attack?

to prevent the target server from being able to handle additional requests


Conjuntos de estudio relacionados

Chapter 16 Organization Change and Change Management

View Set

PrepU Medsurg Chapter 44: Digestive and Gastrointestinal Treatment Modalities

View Set

"My Name is not Easy" Vocabulary

View Set

Chapter 6: Democracy and Authoritarianism

View Set

Azure Data Scientists Associate Knowledge Check

View Set

BIOL 101: Exam 1: Chapter 2 Review Questions

View Set