module 15

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the primary means for mitigating virus and Trojan horse attacks? encryption antivirus software antisniffer software blocking ICMP echo and echo-replies

antivirus software

What characteristic describes a Trojan horse? malicious software or code running on an end device the use of stolen credentials to access private data a network device that filters access and traffic coming into a network applications that protect end devices from becoming infected with malicious software

malicious software o code running on end device

What kind of threat is described when a threat actor alters data records? data loss or manipulation disruption of service identify theft information theft

data loss or manipulation

What characteristic describes adware? software that is installed on a user device and collects information about the user an email pretending to represent a legitimate organization asking for personal information a network device that filters access and traffic coming into a network an attack that slows or crashes a device or network service

software installed on user device and collects info about user

Safa was surfing the internet when a program appeared claiming that she had won a prize. When she clicked to see what prize she had won, a program was installed on her computer unknowingly to her. The program that was installed allowed an intruder access to her hard drive and personal information. virus worm Trojan horse

trojan horse

True or false? Spyware is a program that gathers personal information from your computer without your permission or knowledge.

true

What characteristic describes identity theft? the use of stolen credentials to access private data software that is installed on a user device and collects information about the user software that identifies email spam and automatically deletes or places them in a junk folder an attack that slows or crashes a device or network service

use of stolen credentials to access private data

Noah downloaded a file from the internet. Shortly after he opened the file, his hard drive crashed, and he lost all information on his computer. virus worm Trojan horse

virus

What characteristic describes a virus? malicious software or code running on an end device applications that protect end devices from becoming infected with malicious software the use of stolen credentials to access private data an attack that slows or crashes a device or network service

malicious software or code running on an end device

What characteristic describes a firewall appliance? a network device that filters access and traffic coming into a network software that identifies email spam and automatically deletes or places them in a junk folder malicious software or code running on an end device applications that protect end devices from becoming infected with malicious software

network device filters access and traffic coming into a network

What characteristic describes antivirus software? applications that protect end devices from becoming infected with malicious software a network device that filters access and traffic coming into a network software that identifies email spam and automatically deletes or places them in a junk folder malicious software or code running on an end device

applications protect end devices from becoming infected with malicious software

What characteristic describes antivirus software? applications that protect end devices from becoming infected with malicious software the use of stolen credentials to access private data an email pretending to represent a legitimate organization asking for personal information software that is installed on a user device and collects information about the user

applications protect end devices from becoming infected with malicious software

Which of the following describes a DoS attack? (Choose two.) The attack is relatively simple to conduct, even by an unskilled threat actor. The attack originates from multiple, coordinated sources. Zombies are controlled by a command and control server. A threat actor builds a network of infected hosts, called a botnet. A network, host, or application is sent an enormous quantity of data at a rate which it cannot handle.

attack is relatively simple to conduct, even by unskilled actor network, host or application sent an enormous quantity of data at rate which cannot handle

Which of the following describes a DDoS attack? (Choose three.) The attack is relatively simple to conduct, even by an unskilled threat actor. The attack originates from multiple, coordinated sources. Zombies are controlled by a command and control server. A threat actor builds a network of infected hosts, called a botnet. A network, host, or application is sent an enormous quantity of data at a rate which it cannot handle.

attack originates from multiple, coordinated sources zombies are controlled by command and control server threat actor builds a network of infected hosts, called botnet

What characteristic describes a DoS attack? an attack that slows or crashes a device or network service malicious software or code running on an end device a network device that filters access and traffic coming into a network applications that protect end devices from becoming infected with malicious software

attack slows or crashes a device o network service

What characteristic describes a DoS attack? an attack that slows or crashes a device or network service the use of stolen credentials to access private data applications that protect end devices from becoming infected with malicious software software that identifies email spam and automatically deletes or places them in a junk folder

attack slows or crashes a device or network service

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? data loss or manipulation disruption of service identify theft information theft

data loss or manipulation

What type of attack is the ping of death? brute force social engineering denial of service virus

denial of service

What kind of threat is described when a threat actor overloads a network to deny other users network access? data loss or manipulation disruption of service identify theft information theft

disruption of service

What kind of threat is described when a threat actor prevents legal users from accessing data services? data loss or manipulation disruption of service identify theft information theft

disruption of service

What characteristic describes phishing? an email pretending to represent a legitimate organization asking for personal information a network device that filters access and traffic coming into a network an attack that slows or crashes a device or network service applications that protect end devices from becoming infected with malicious software

email pretending to represent legitimate organization asking for personal info

True or false? A botnet is an individual infected computer that can be controlled by a command and control server

false

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person? data loss or manipulation disruption of service identify theft information theft

identify theft

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information? data loss or manipulation disruption of service identify theft information theft

identify theft

What kind of threat is described when a threat actor is stealing the user database of a company? data loss or manipulation disruption of service identify theft information theft

information theft

What kind of threat is described when a threat actor steals scientific research data? data loss or manipulation disruption of service identify theft information theft

information theft

What characteristic describes spyware? software that is installed on a user device and collects information about the user the use of stolen credentials to access private data software that identifies email spam and automatically deletes or places them in a junk folder an attack that slows or crashes a device or network service

software installed on user device and collects info about user

What characteristic describes antispam? software that identifies email spam and automatically deletes or places them in a junk folder applications that protect end devices from becoming infected with malicious software software that is installed on a user device and collects information about the user malicious software or code running on an end device

software that identifies email spam and automatically deletes or places them in junk folder

Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send. virus worm Trojan horse

worm


संबंधित स्टडी सेट्स

Chapter 2 MIS Quizlet (incomplete)

View Set

Chapter 14: Natural Selection & Adaptation

View Set