IS607 M03 Quiz3 CH3 & CH8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of attack involves capturing data packets from a network and retransmitting them to produce an unauthorized effect? The receipt of duplicate, authenticated Internet Protocol (IP) packets may disrupt service or produce another undesired consequence. A. Replay B. Man-in-the-middle C. Hijacking D. IP spoofing

A. Replay Systems can be broken through replay attacks when attackers reuse old messages or parts of old messages to deceive system users. Breaking a system this way helps intruders to gain information that allows unauthorized access into the system. Ahead: What Is a Malicious Attack? Complexity: Medium Subject: Chapter 3 Taxonomy: Understand Title: Risks, Threats, and Vulnerabilities

Which of the following is a type of denial of service (DoS) attack? A. Synchronize (SYN) flood B. Structured Query Language (SQL) injection C. Cross-site scripting (XSS) D. Logic bomb

A. Synchronize (SYN) flood One popular technique for DoS attacks is called a SYN flood. In a SYN flood, the attacker uses Internet Protocol (IP) spoofing to send a large number of packets requesting connections to the victim computer. Ahead: The Main Types of Malware Complexity: Easy Subject: Chapter 8 Taxonomy: Remember Title: Malicious Software and Attack Vectors

Which type of virus targets computer hardware and software startup functions? A. System infector B. File infector C. Hardware infector D. Data infector

A. System infector There are three primary types of viruses. System infectors target computer hardware and software startup functions. File infectors attack and modify executable programs (such as COM, EXE, SYS, and DLL files in Microsoft Windows). Data infectors attack document files containing embedded macro programming capabilities. Ahead: The Main Types of Malware Complexity: Medium Subject: Chapter 8 Taxonomy: Remember Title: Malicious Software and Attack Vectors

True or False? In a browser or uniform resource locator (URL) hijacking attack, users are directed to websites other than what they requested, usually to fake pages that attackers have created. A. True B. False

A. True Ahead: What Is a Malicious Attack? Complexity: Medium Subject: Chapter 3 Title: Risks, Threats, and Vulnerabilities

True or False? Anti-malware programs and firewalls cannot detect most phishing scams because the scams do not contain suspect code. A. True B. False

A. True Ahead: What Is a Malicious Attack? Complexity: Medium Subject: Chapter 3 Title: Risks, Threats, and Vulnerabilities

True or False? A man-in-the-middle attack takes advantage of the multihop process used by many types of networks. A. True B. False

A. True Ahead: What Is a Malicious AttackComplexity: Medium Subject: Chapter 3 Title: Risks, Threats, and Vulnerabilities

What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations? A. Whois B. Simple Network Management Protocol (SNMP) C. Ping D. Domain Name System (DNS)

A. Whois Whois is a tool that provides information on domain registrations, including the registrar, name servers, and the name of the registering organization. Ahead: Anatomy of an Attack Complexity: Medium Subject: Chapter 8 Taxonomy: ApplyTitle: Malicious Software and Attack Vectors

True or False? Corrective controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution. A. True B. False

B. False Compensating controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution. Ahead: The Risk Management Process Complexity: Hard Subject: Chapter 3 Title: Risks, Threats, and Vulnerabilities

The chief executive officer (CEO) of a company recently fell victim to an attack. The attackers sent the CEO an email that appeared to come from the company's attorney. The email informed the CEO that his company was being sued and he needed to view a subpoena at a court website. When visiting the website, malicious code was downloaded onto the CEO's computer. What type of attack took place? A. Pharming B. Spear phishing C. Command injection D. Ransomware

B. Spear phishing This scenario is a classic example of a spear phishing attack, highly targeted at an individual and including information about the company. Ahead: The Main Types of Malware Complexity: Medium Subject: Chapter 8 Taxonomy: Understand Title: Malicious Software and Attack Vectors

Karen is a hacker. She wants to access a server and control it remotely. The tool she plans to use is a type of Trojan. What tool will Karen use for this purpose? A. Ping B. Network mapper (Nmap) C. Remote Access Tool (RAT) D. Simple Network Management Protocol (SNMP) agent

C. Remote Access Tool (RAT) RAT is a Trojan that, when executed, enables an attacker to remotely control and maintain access to a compromised computer. Ahead: Anatomy of an Attack Complexity: Medium Subject: Chapter 8 Taxonomy: Apply Title: Malicious Software and Attack Vectors


Ensembles d'études connexes

European Modernism, Le Corbusier

View Set

Leadership Roles and Management of nursing- Chapters 1-6

View Set

Writings on the Wall - The Writer

View Set

CCNA 1 v7 Modules 1 – 3: Basic Network Connectivity and Communications Exam Answers

View Set