Chapter 2 - Review Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The preferred method today of bot herders for command and control of zombies is . a. Internet Relay Chat (IRC) b. botnets c. Hypertext Transport Protocol (HTTP) d

. C. Hypertext Transport Protocol (HTTP)

A watering hole attack is directed against . a. wealthy individuals b. attackers who send spam c. all users of a large corporation d. users who access a common website

. D. users who access a common website

_______________. sends phishing messages only to wealthy individuals. a. Spear phishing b. Target phishing c. Microing d. Whaling

A. Spear phishing

Which of these is a general term used for describing software that gathers information without the user's consent? a. adware b. spyware c. scrapeware d. pullware

A. adware (Note from the quizlet author: This one could also be B. Spyware as it functions in the same manner)

Each of these is a reason why adware is scorned EXCEPT . a. it displays the attacker's programming skills b. it can interfere with a user's productivity c. it displays objectionable content d. it can cause a computer to crash or slow down

A. it displays the attacker's programming skills

What is unsolicited instant messaging called? a. spim b. spam c. vishing d. SMS phishing

A. spim

Which of these is NOT an action that a virus can take? a. transport itself through the network to another device b. cause a computer to crash c. erase files from a hard drive d. reformat the hard disk drive

A. transport itself through the network to another device

How can an attacker use a hoax? a. By sending out a hoax, an attacker can convince a user to read his email more often. b. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. c. A user who receives multiple hoaxes could contact his supervisor for help. d. Hoaxes are not used by attackers today.

B. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.

Which statement regarding a keylogger is NOT true? a. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port. b. Software keyloggers are easy to detect. c. Keyloggers can be used to capture passwords, credit card numbers, or personal information. d. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

B. Software keyloggers are easy to detect.

Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed? a. aliasing b. impersonation c. luring d. duplicity

B. impersonation

Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency? a. virus b. ransomware c. worm d. Trojan

B. ransomware

What is it called when a user makes a typing error when entering a URL that takes him to an imposter website? a. URL variance b. typo squatting c. spell scraping d. work hijacking

B. typo squatting

Which of these could NOT be defined as a logic bomb? a. Erase all data if John Smith's name is removed from the list of employees. b. Reformat the hard drive three months after Susan Jones left the company. c. Send spam email to all users in the company on Tuesday. d. If the company's stock price drops below $10, then credit Jeff Brown with 10 additional years of retirement credit.

C. Send spam email to all users in the company on Tuesday.

. ___________________is following an authorized person through a secure door. a. Tagging b. Backpacking c. Tailgating d. Caboosing

C. Tailgating

A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a . a. virus b. worm c. Trojan d. logic bomb

C. Trojan

What is the term used for an attacker who controls multiple zombies in a botnet? a. zombie shepherd b. rogue IRC c. bot herder d. cyber-robot

C. bot herder

Which of the following is an attempt to influence a user by coercion? a. authority b. social proof c. intimidation d. familiarity

C. intimidation

A(n) requires a user to transport it from one computer to another. a. worm b. rootkit c. virus d. adware

C. virus

What should you do to completely remove a rootkit from a computer? a. Flash the ROM BIOS. b. Erase and reinstall all files in the WINDOWS folder. c. Expand the Master Boot Record. d. Reformat the hard drive and reinstall the operating system

D. Reformat the hard drive and reinstall the operating system.

Which of these items retrieved through dumpster diving would NOT provide useful information? a. calendars b. memos c. organizational charts d. books

D. books


संबंधित स्टडी सेट्स

Chapter 26: Soft Tissue Injuries

View Set

OH Life Insurance: Life Insurance Basics

View Set

Macroeconomics final review chapters 7,8 and 10-12 and Chapters 13-18

View Set

ch 27 linux+ controlling versions with git

View Set

Neurobiology Test #3 Study Guide Teacher's Version

View Set

Abeka 5th Grade History Quiz 13 (pages 105-115; Geography Facts 8)

View Set