Cisco Intro to Cybersecurity Chapter 2
Which example illustrates how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
Which tool is used to provide a list of open ports on network devices?
Nmap
Which type of attack allows an attacker to use a brute force approach?
Password Cracking
In what way are zombies used in security attacks?
They are infected machines that carry out a DDoS attack.
What is the purpose of a rootkit?
to gain privileged access to a device while concealing itself
What is the most common goal of search engine optimization (SEO) poisoning?
to increase web traffic to malicious sites
What is the primary goal of a DoS attack?
to prevent the target server from being able to handle additional requests