CSIT 161 Chapter 8 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is not a typical sign of virus activity on a system?

Unexpected power failures

What file type is least likely to be impacted by a file infector virus?

.docx

Tonya would like to protect her users and the network when users browse to known dangerous sites. She plans to maintain a list of those sites and drop messages from those websites. What type of approach is Tonya advocating?

Blacklisting

Larry recently viewed an auction listing on a website. As a result, his computer executed code that popped up a window that asked for his password. What type of attack has Larry likely encountered?

Cross-site scripting (XSS)

What program, released in 2013, is an example of ransomware?

CryptoLocker

What type of attack occurs in real time and is often conducted against a specific target?

Direct

What type of system is intentionally exposed to attackers in an attempt to lure them out?

Honeypot

Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she filter?

Internet Control Message Protocol (ICMP)

Alison is a security professional. A user reports that, after opening an email attachment, every document he saves is in a template format and other Microsoft Word documents will not open. After investigating the issue, Alison determines that the user's Microsoft Office normal.dot template has been damaged, as well as many Word files. What type of virus is the most likely cause?

Macro virus

Karen is a hacker. She wants to access a server and control it remotely. The tool she plans to use is a type of Trojan. What tool will Karen use for this purpose?

Remote Access Tool (RAT)

Devaki is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged in to Devaki's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place?

Session hijacking

Arturo discovers a virus on his system that resides only in the computer's memory and not in a file. What type of virus has he discovered?

Slow virus

The chief executive officer (CEO) of a company recently fell victim to an attack. The attackers sent the CEO an email that appeared to come from the company's attorney. The email informed the CEO that his company was being sued and he needed to view a subpoena at a court website. When visiting the website, malicious code was downloaded onto the CEO's computer. What type of attack took place?

Spear phishing

Bob is developing a web application that depends on a backend database. What type of attack could a malicious individual use to send commands through his web application to the database?

Structured Query Language (SQL) injection

Which of the following is a type of denial of service (DoS) attack? -Logic bomb -Synchronize (SYN) flood -Cross-site scripting (XSS) -Structured Query Language (SQL) injection

Synchronize (SYN) flood

Which type of virus targets computer hardware and software startup functions?

System infector

Lin installed a time-management utility that she downloaded from the Internet. Now several applications are not responding to normal commands. What type of malware did she likely encounter?

Trojan horse

Wen is a network security professional. He wants to strengthen the security of his agency's network infrastructure defenses. Which control can he use to protect the network?

Use proxy services and bastion hosts to protect critical services

What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations?

Whois

Hacking groups create _______ to launch attacks whereby they infect vulnerable machines with agents that perform various functions at the command of the controller.

botnets


Ensembles d'études connexes

ATI - PN Fundamentals Online Practice 2020 A

View Set

Interpersonal Communication Chapter 2

View Set

NET260.30 LINUX ADMINISTRATION Chapter 11

View Set

Информатика 4 класс Горячев

View Set

Chapter 32: Drug Therapy to Decrease Histamine Effects and Allergic Response

View Set

Management, chap 5: Managing Social Responsibilities

View Set